CVE-2021-26247
MEDIUM NUCLEICacti - XSS
Title source: ruleDescription
As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassword.php?ref=<script>alert(1)</script>" to successfully execute the JavaScript payload present in the "ref" URL parameter.
Nuclei Templates (1)
Cacti - Cross-Site Scripting
MEDIUMby dhiyaneshDK
Shodan:
http.title:"login to cacti" || http.title:"cacti" || http.favicon.hash:"-1797138069"
FOFA:
icon_hash="-1797138069" || title="cacti" || title="login to cacti"
References (1)
Scores
CVSS v3
6.1
EPSS
0.2104
EPSS Percentile
95.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
cacti/cacti
0.8.7g
Published
Jan 19, 2022
Tracked Since
Feb 18, 2026