Description
Cacti provides an operational monitoring and fault management framework. Prior to 1.2.27, some of the data stored in `form_save()` function in `data_queries.php` is not thoroughly checked and is used to concatenate the HTML statement in `grow_right_pane_tree()` function from `lib/html.php` , finally resulting in cross-site scripting. Version 1.2.27 contains a patch for the issue.
References (4)
Core 4
Core References
Exploit, Vendor Advisory x_refsource_confirm
https://github.com/Cacti/cacti/security/advisories/GHSA-rqc8-78cm-85j3
Patch x_refsource_misc
https://github.com/Cacti/cacti/commit/f946fa537d19678f938ddbd784a10e3290d275cf
Scores
CVSS v3
5.7
EPSS
0.0049
EPSS Percentile
65.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
cacti/cacti
< 1.2.27
fedoraproject/fedora
39
Published
May 14, 2024
Tracked Since
Feb 18, 2026