296,663
Total vulnerabilities in the database
LibreNMS <= 25.8.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Transports management functionality. When an administrator creates a new Alert Transport, the value of the Transport name
field is stored and later rendered in the Transports column of the Alert Rules page without proper input validation or output encoding. This leads to arbitrary JavaScript execution in the admin’s browser.
Transport name
field in /alert-transports
./alert-rules
.Log in with an administrator account.
Navigate to:
http://localhost:8000/alert-transports
Click Create alert transport and provide the following values:
Transport name:
'onfocus='alert(1)' autofocus=
Default Alert: ON
Email: test@gmail.com
(or any valid email)
Save the transport.
Navigate to http://localhost:8000/alert-rules
. A popup alert(1)
is triggered, confirming that the payload executes.
<img width="1829" height="396" alt="image" src="https://github.com/user-attachments/assets/932ba17d-214d-4253-80b8-62539d1cfa28" />
Only accounts with the admin role who access the Alert Rules page (http://localhost:8000/alert-rules
) are affected.
Software | From | Fixed in |
---|---|---|
![]() |
- | 25.10.0 |