CVE-2025-47931: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in librenms librenms
LibreNMS is PHP/MySQL/SNMP based network monitoring software. LibreNMS v25.4.0 and prior suffers from a Stored Cross-Site Scripting (XSS) Vulnerability in the `group name` parameter of the `http://localhost/poller/groups` form. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. LibreNMS v25.5.0 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-47931 is a stored Cross-Site Scripting (XSS) vulnerability affecting LibreNMS, a widely used PHP/MySQL/SNMP-based network monitoring software. The vulnerability exists in versions prior to 25.5.0 and specifically targets the 'group name' parameter within the /poller/groups form. Due to improper neutralization of input during web page generation (CWE-79), an attacker can inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who view the affected page. This type of vulnerability can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability requires no authentication (AV:N, PR:N) but does require user interaction (UI:P) since the victim must visit the compromised page to trigger the payload. The CVSS 4.0 base score is 2.1 (low severity), reflecting limited impact on confidentiality, integrity, and availability, and the lack of privilege requirements. LibreNMS version 25.5.0 includes a patch that properly sanitizes the group name input to prevent script injection. There are no known exploits in the wild at this time. Given LibreNMS’s role in network monitoring, exploitation could allow attackers to target administrators or users with elevated privileges, potentially facilitating further attacks or information disclosure within monitored networks.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of user sessions and data accessible through LibreNMS. Since LibreNMS is often deployed in enterprise and service provider environments to monitor critical network infrastructure, successful exploitation could allow attackers to execute malicious scripts in the context of network administrators’ browsers. This could lead to theft of session cookies, unauthorized commands, or redirection to malicious sites, undermining trust in monitoring data and potentially enabling lateral movement within the network. However, the low CVSS score and requirement for user interaction limit the risk to targeted attacks rather than widespread automated exploitation. Organizations relying on LibreNMS for network visibility should consider the potential for attackers to leverage this vulnerability as an initial foothold or to escalate privileges indirectly. The absence of known active exploits reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
1. Upgrade LibreNMS to version 25.5.0 or later immediately to apply the official patch that sanitizes the 'group name' parameter input. 2. Implement strict Content Security Policy (CSP) headers on the LibreNMS web interface to restrict the execution of unauthorized scripts. 3. Restrict access to the LibreNMS web interface to trusted networks and users, ideally via VPN or zero-trust network access solutions, to reduce exposure to untrusted actors. 4. Conduct regular security awareness training for administrators and users to recognize suspicious behavior and avoid interacting with untrusted links or inputs. 5. Monitor web server and application logs for unusual input patterns or repeated attempts to inject scripts into the group name parameter. 6. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting LibreNMS. 7. Review and harden user roles and permissions within LibreNMS to minimize the impact of any compromised accounts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-47931: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in librenms librenms
Description
LibreNMS is PHP/MySQL/SNMP based network monitoring software. LibreNMS v25.4.0 and prior suffers from a Stored Cross-Site Scripting (XSS) Vulnerability in the `group name` parameter of the `http://localhost/poller/groups` form. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users. LibreNMS v25.5.0 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-47931 is a stored Cross-Site Scripting (XSS) vulnerability affecting LibreNMS, a widely used PHP/MySQL/SNMP-based network monitoring software. The vulnerability exists in versions prior to 25.5.0 and specifically targets the 'group name' parameter within the /poller/groups form. Due to improper neutralization of input during web page generation (CWE-79), an attacker can inject malicious JavaScript code that is stored on the server and subsequently executed in the browsers of users who view the affected page. This type of vulnerability can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability requires no authentication (AV:N, PR:N) but does require user interaction (UI:P) since the victim must visit the compromised page to trigger the payload. The CVSS 4.0 base score is 2.1 (low severity), reflecting limited impact on confidentiality, integrity, and availability, and the lack of privilege requirements. LibreNMS version 25.5.0 includes a patch that properly sanitizes the group name input to prevent script injection. There are no known exploits in the wild at this time. Given LibreNMS’s role in network monitoring, exploitation could allow attackers to target administrators or users with elevated privileges, potentially facilitating further attacks or information disclosure within monitored networks.
Potential Impact
For European organizations, the impact of this vulnerability is primarily on the confidentiality and integrity of user sessions and data accessible through LibreNMS. Since LibreNMS is often deployed in enterprise and service provider environments to monitor critical network infrastructure, successful exploitation could allow attackers to execute malicious scripts in the context of network administrators’ browsers. This could lead to theft of session cookies, unauthorized commands, or redirection to malicious sites, undermining trust in monitoring data and potentially enabling lateral movement within the network. However, the low CVSS score and requirement for user interaction limit the risk to targeted attacks rather than widespread automated exploitation. Organizations relying on LibreNMS for network visibility should consider the potential for attackers to leverage this vulnerability as an initial foothold or to escalate privileges indirectly. The absence of known active exploits reduces immediate risk but does not eliminate the need for prompt remediation.
Mitigation Recommendations
1. Upgrade LibreNMS to version 25.5.0 or later immediately to apply the official patch that sanitizes the 'group name' parameter input. 2. Implement strict Content Security Policy (CSP) headers on the LibreNMS web interface to restrict the execution of unauthorized scripts. 3. Restrict access to the LibreNMS web interface to trusted networks and users, ideally via VPN or zero-trust network access solutions, to reduce exposure to untrusted actors. 4. Conduct regular security awareness training for administrators and users to recognize suspicious behavior and avoid interacting with untrusted links or inputs. 5. Monitor web server and application logs for unusual input patterns or repeated attempts to inject scripts into the group name parameter. 6. Employ web application firewalls (WAFs) with rules tuned to detect and block XSS payloads targeting LibreNMS. 7. Review and harden user roles and permissions within LibreNMS to minimize the impact of any compromised accounts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-05-14T10:32:43.529Z
- Cisa Enriched
- true
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb489
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/4/2025, 1:27:17 PM
Last updated: 8/14/2025, 3:40:50 PM
Views: 18
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.