Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22384 | LibreNMS has Authenticated Remote File Inclusion in ajax_form.php that Allows RCE |
Github GHSA |
GHSA-gq96-8w38-hhj2 | LibreNMS has Authenticated Remote File Inclusion in ajax_form.php that Allows RCE |
Tue, 05 Aug 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
Wed, 23 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librenms
Librenms librenms |
|
| Vendors & Products |
Librenms
Librenms librenms |
Tue, 22 Jul 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. LibreNMS versions 25.6.0 and below contain an architectural vulnerability in the ajax_form.php endpoint that permits Remote File Inclusion based on user-controlled POST input. The application directly uses the type parameter to dynamically include .inc.php files from the trusted path includes/html/forms/, without validation or allowlisting. This pattern introduces a latent Remote Code Execution (RCE) vector if an attacker can stage a file in this include path — for example, via symlink, development misconfiguration, or chained vulnerabilities. This is fixed in version 25.7.0. | |
| Title | LibreNMS has Authenticated Local File Inclusion in ajax_form.php that Allows RCE | |
| Weaknesses | CWE-98 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-07-23T18:26:50.196Z
Reserved: 2025-07-16T23:53:40.510Z
Link: CVE-2025-54138
Updated: 2025-07-23T18:26:42.704Z
Status : Analyzed
Published: 2025-07-22T22:15:38.240
Modified: 2025-08-05T17:52:39.603
Link: CVE-2025-54138
No data.
OpenCVE Enrichment
Updated: 2025-07-23T17:36:03Z
EUVD
Github GHSA