Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6g2v-66ch-6xmh | LibreNMS alert-rules has a Cross-Site Scripting Vulnerability |
Thu, 23 Oct 2025 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Librenms
Librenms librenms |
|
| Vendors & Products |
Librenms
Librenms librenms |
Thu, 16 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 16 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | LibreNMS is a community-based GPL-licensed network monitoring system. The alert rule name in the Alerts > Alert Rules page is not properly sanitized, and can be used to inject HTML code. This vulnerability is fixed in 25.10.0. | |
| Title | LibreNMS alert-rules Cross-Site Scripting Vulnerability | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-16T19:21:43.259Z
Reserved: 2025-10-13T16:26:12.179Z
Link: CVE-2025-62412
Updated: 2025-10-16T18:25:53.790Z
Status : Analyzed
Published: 2025-10-16T18:15:39.920
Modified: 2025-10-23T12:31:34.033
Link: CVE-2025-62412
No data.
OpenCVE Enrichment
Updated: 2025-10-20T13:24:59Z
Github GHSA