CVE-2025-45160: n/a
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page.
AI Analysis
Technical Summary
CVE-2025-45160 identifies an HTML injection vulnerability in the file upload functionality of Cacti versions up to 1.2.29. Specifically, when a user attempts to upload a file with an invalid format, the application generates an error popup that reflects the submitted filename back to the user interface without proper sanitization or encoding. This lack of input validation allows an attacker to inject arbitrary HTML elements such as <h1>, <b>, or <svg> tags into the rendered error message. While this vulnerability does not directly allow code execution, it can be leveraged to manipulate the user interface, conduct phishing attacks by injecting deceptive content, or potentially execute client-side scripts if combined with other vulnerabilities. The vulnerability arises from improper handling of user-supplied input in the error feedback mechanism, a common vector for injection attacks. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all Cacti instances up to version 1.2.29, a widely used open-source network monitoring tool. Given Cacti’s role in monitoring network performance and infrastructure, exploitation could undermine trust in monitoring data and potentially expose sensitive network information through manipulated UI elements.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to several adverse effects. Injected HTML content in error popups could be used to mislead administrators or users, potentially facilitating social engineering or phishing attacks within trusted network management interfaces. This could result in unauthorized access if attackers trick users into divulging credentials or executing malicious actions. Additionally, UI manipulation might degrade the integrity and reliability of monitoring data presentation, impacting operational decision-making. While the vulnerability does not directly compromise system availability or allow remote code execution, it undermines confidentiality and integrity of the user interface. Organizations in sectors with critical infrastructure monitored by Cacti, such as telecommunications, energy, and finance, could face increased risk. The absence of known exploits reduces immediate threat but does not eliminate the potential for future targeted attacks, especially as Cacti is commonly deployed in enterprise environments across Europe.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running Cacti versions up to 1.2.29 and plan to upgrade to a patched version once available. In the interim, administrators can implement strict input validation and sanitization on the server side to ensure that filenames and other user inputs are properly escaped before rendering in any UI components. Employing Content Security Policy (CSP) headers can help restrict the execution of injected scripts or malicious HTML. Additionally, restricting file upload types and enforcing file format validation can reduce the attack surface. Monitoring logs for unusual upload attempts or error popup anomalies may help detect exploitation attempts. Network segmentation and limiting access to the Cacti interface to trusted administrators can further reduce risk. Finally, educating users about the risks of interacting with unexpected UI elements can help mitigate social engineering vectors.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-45160: n/a
Description
A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page.
AI-Powered Analysis
Technical Analysis
CVE-2025-45160 identifies an HTML injection vulnerability in the file upload functionality of Cacti versions up to 1.2.29. Specifically, when a user attempts to upload a file with an invalid format, the application generates an error popup that reflects the submitted filename back to the user interface without proper sanitization or encoding. This lack of input validation allows an attacker to inject arbitrary HTML elements such as <h1>, <b>, or <svg> tags into the rendered error message. While this vulnerability does not directly allow code execution, it can be leveraged to manipulate the user interface, conduct phishing attacks by injecting deceptive content, or potentially execute client-side scripts if combined with other vulnerabilities. The vulnerability arises from improper handling of user-supplied input in the error feedback mechanism, a common vector for injection attacks. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all Cacti instances up to version 1.2.29, a widely used open-source network monitoring tool. Given Cacti’s role in monitoring network performance and infrastructure, exploitation could undermine trust in monitoring data and potentially expose sensitive network information through manipulated UI elements.
Potential Impact
For European organizations, exploitation of this vulnerability could lead to several adverse effects. Injected HTML content in error popups could be used to mislead administrators or users, potentially facilitating social engineering or phishing attacks within trusted network management interfaces. This could result in unauthorized access if attackers trick users into divulging credentials or executing malicious actions. Additionally, UI manipulation might degrade the integrity and reliability of monitoring data presentation, impacting operational decision-making. While the vulnerability does not directly compromise system availability or allow remote code execution, it undermines confidentiality and integrity of the user interface. Organizations in sectors with critical infrastructure monitored by Cacti, such as telecommunications, energy, and finance, could face increased risk. The absence of known exploits reduces immediate threat but does not eliminate the potential for future targeted attacks, especially as Cacti is commonly deployed in enterprise environments across Europe.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first verify if they are running Cacti versions up to 1.2.29 and plan to upgrade to a patched version once available. In the interim, administrators can implement strict input validation and sanitization on the server side to ensure that filenames and other user inputs are properly escaped before rendering in any UI components. Employing Content Security Policy (CSP) headers can help restrict the execution of injected scripts or malicious HTML. Additionally, restricting file upload types and enforcing file format validation can reduce the attack surface. Monitoring logs for unusual upload attempts or error popup anomalies may help detect exploitation attempts. Network segmentation and limiting access to the Cacti interface to trusted administrators can further reduce risk. Finally, educating users about the risks of interacting with unexpected UI elements can help mitigate social engineering vectors.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 697b9895ac06320222a54d49
Added to database: 1/29/2026, 5:27:49 PM
Last enriched: 1/29/2026, 5:42:35 PM
Last updated: 1/29/2026, 6:32:11 PM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-69749: n/a
UnknownCVE-2025-15548: CWE-311 Missing Encryption of Sensitive Data in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15543: CWE-59 Improper Link Resolution Before File Access ('Link Following') in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15542: CWE-754 Improper Check for Unusual or Exceptional Conditions in TP-Link Systems Inc. VX800v v1.0
MediumCVE-2025-15541: CWE-59 Improper Link Resolution Before File Access ('Link Following') in TP-Link Systems Inc. VX800v v1.0
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.