Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3765-1 | cacti security update |
Debian DSA |
DSA-5646-1 | cacti security update |
EUVD |
EUVD-2023-53102 | Cacti is an open source operational monitoring and fault management framework. The fix applied for CVE-2023-39515 in version 1.2.25 is incomplete as it enables an adversary to have a victim browser execute malicious code when a victim user hovers their mouse over the malicious data source path in `data_debug.php`. To perform the cross-site scripting attack, the adversary needs to be an authorized cacti user with the following permissions: `General Administration>Sites/Devices/Data`. The victim of this attack could be any account with permissions to view `http://<HOST>/cacti/data_debug.php`. As of time of publication, no complete fix has been included in Cacti. |
Thu, 26 Feb 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-25T16:34:32.172Z
Reserved: 2023-11-21T18:57:30.429Z
Link: CVE-2023-49088
Updated: 2024-08-02T21:46:29.327Z
Status : Modified
Published: 2023-12-22T17:15:08.247
Modified: 2024-11-21T08:32:47.840
Link: CVE-2023-49088
No data.
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD