CVE-2025-45160: n/a
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.
AI Analysis
Technical Summary
CVE-2025-45160 identifies an HTML injection vulnerability in the widely used network monitoring tool Cacti, specifically in versions up to 1.2.29. The vulnerability occurs within the file upload feature when a user attempts to upload a file with an invalid format. Instead of properly sanitizing the filename before displaying it in an error popup, the application reflects the raw filename back into the HTML response. This lack of sanitization allows attackers to inject arbitrary HTML elements such as <h1>, <b>, or <svg> tags into the rendered page. While this is not a classic cross-site scripting (XSS) vulnerability, it can be leveraged to manipulate the page content, potentially misleading users or enabling further attacks if combined with other vulnerabilities. The CVSS score of 5.4 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality and integrity impact (C:L/I:L). Notably, multiple third parties and the Cacti maintainer have stated that the issue could not be reproduced after version 1.2.27, implying that fixes or changes in later versions may have mitigated or eliminated the vulnerability. No public exploits have been reported, reducing immediate risk. The vulnerability is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), emphasizing the importance of input sanitization. Since Cacti is often deployed in network monitoring environments, exploitation could allow attackers to inject misleading content into the monitoring interface, potentially obscuring alerts or causing confusion among administrators. However, the impact on system availability is negligible, and exploitation requires at least low-level privileges on the network, limiting the attack surface.
Potential Impact
For European organizations, the primary impact of CVE-2025-45160 lies in the potential manipulation of the Cacti monitoring interface through injected HTML elements. This could lead to misinformation or confusion among network administrators, possibly delaying response to genuine network issues or masking malicious activity. The confidentiality impact is limited but could include exposure of sensitive filenames or metadata if combined with other vulnerabilities. Integrity is moderately affected as the attacker can alter the displayed content, but no direct data modification or system compromise is implied. Availability remains unaffected. Organizations relying heavily on Cacti for critical infrastructure monitoring, such as utilities, telecommunications, and government agencies, may face increased risk if attackers exploit this vulnerability to disrupt monitoring accuracy. The requirement for low privileges and network access means internal threat actors or attackers who have gained limited access could exploit this flaw. Given the absence of known exploits in the wild, the immediate risk is moderate, but the potential for targeted attacks exists, especially in sectors where network monitoring is vital for operational security.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Upgrade Cacti installations to versions beyond 1.2.29, preferably the latest stable release, as the vulnerability appears unreproducible after 1.2.27, indicating fixes. 2) If upgrading is not immediately feasible, apply input validation and sanitization on the filename parameter in the file upload error handling code to neutralize HTML tags and special characters. 3) Restrict allowed file upload types strictly to expected formats to reduce the chance of invalid filenames triggering the vulnerability. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts targeting the file upload endpoint. 5) Monitor logs for unusual file upload errors or unexpected HTML content in error messages. 6) Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. 7) Conduct security awareness training for administrators to recognize potential interface manipulation. 8) Regularly audit and review Cacti configurations and customizations to ensure no additional injection vectors exist. These targeted steps go beyond generic advice by focusing on the specific injection vector and operational context of Cacti deployments.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy
CVE-2025-45160: n/a
Description
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.
AI-Powered Analysis
Technical Analysis
CVE-2025-45160 identifies an HTML injection vulnerability in the widely used network monitoring tool Cacti, specifically in versions up to 1.2.29. The vulnerability occurs within the file upload feature when a user attempts to upload a file with an invalid format. Instead of properly sanitizing the filename before displaying it in an error popup, the application reflects the raw filename back into the HTML response. This lack of sanitization allows attackers to inject arbitrary HTML elements such as <h1>, <b>, or <svg> tags into the rendered page. While this is not a classic cross-site scripting (XSS) vulnerability, it can be leveraged to manipulate the page content, potentially misleading users or enabling further attacks if combined with other vulnerabilities. The CVSS score of 5.4 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), and limited confidentiality and integrity impact (C:L/I:L). Notably, multiple third parties and the Cacti maintainer have stated that the issue could not be reproduced after version 1.2.27, implying that fixes or changes in later versions may have mitigated or eliminated the vulnerability. No public exploits have been reported, reducing immediate risk. The vulnerability is classified under CWE-80 (Improper Neutralization of Script-Related HTML Tags in a Web Page), emphasizing the importance of input sanitization. Since Cacti is often deployed in network monitoring environments, exploitation could allow attackers to inject misleading content into the monitoring interface, potentially obscuring alerts or causing confusion among administrators. However, the impact on system availability is negligible, and exploitation requires at least low-level privileges on the network, limiting the attack surface.
Potential Impact
For European organizations, the primary impact of CVE-2025-45160 lies in the potential manipulation of the Cacti monitoring interface through injected HTML elements. This could lead to misinformation or confusion among network administrators, possibly delaying response to genuine network issues or masking malicious activity. The confidentiality impact is limited but could include exposure of sensitive filenames or metadata if combined with other vulnerabilities. Integrity is moderately affected as the attacker can alter the displayed content, but no direct data modification or system compromise is implied. Availability remains unaffected. Organizations relying heavily on Cacti for critical infrastructure monitoring, such as utilities, telecommunications, and government agencies, may face increased risk if attackers exploit this vulnerability to disrupt monitoring accuracy. The requirement for low privileges and network access means internal threat actors or attackers who have gained limited access could exploit this flaw. Given the absence of known exploits in the wild, the immediate risk is moderate, but the potential for targeted attacks exists, especially in sectors where network monitoring is vital for operational security.
Mitigation Recommendations
European organizations should implement the following specific mitigations: 1) Upgrade Cacti installations to versions beyond 1.2.29, preferably the latest stable release, as the vulnerability appears unreproducible after 1.2.27, indicating fixes. 2) If upgrading is not immediately feasible, apply input validation and sanitization on the filename parameter in the file upload error handling code to neutralize HTML tags and special characters. 3) Restrict allowed file upload types strictly to expected formats to reduce the chance of invalid filenames triggering the vulnerability. 4) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious HTML injection attempts targeting the file upload endpoint. 5) Monitor logs for unusual file upload errors or unexpected HTML content in error messages. 6) Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. 7) Conduct security awareness training for administrators to recognize potential interface manipulation. 8) Regularly audit and review Cacti configurations and customizations to ensure no additional injection vectors exist. These targeted steps go beyond generic advice by focusing on the specific injection vector and operational context of Cacti deployments.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697b9895ac06320222a54d49
Added to database: 1/29/2026, 5:27:49 PM
Last enriched: 2/6/2026, 8:37:32 AM
Last updated: 2/7/2026, 1:40:25 PM
Views: 18
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.