CVE-2005-10004
Cacti graph_view.php RCE via graph_start Parameter Injection
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly handled during graph rendering. This flaw allows attackers to execute commands on the underlying operating system with the privileges of the web server process, potentially compromising system integrity.
| CWE | CWE-78 |
| Vendor | raxnet/ian berry |
| Product | cacti |
| Published | Aug 30, 2025 |
| Last Updated | Apr 7, 2026 |
Stay Ahead of the Next One
Get instant alerts for raxnet/ian berry cacti
Be the first to know when new unknown vulnerabilities affecting raxnet/ian berry cacti are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
Raxnet/Ian Berry / Cacti
* < 0.8.6-d
References
raw.githubusercontent.com: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/cacti_graphimage_exec.rb exploit-db.com: https://www.exploit-db.com/exploits/9911 exploit-db.com: https://www.exploit-db.com/exploits/16881 cacti.net: https://www.cacti.net/info/downloads web.archive.org: https://web.archive.org/web/20050305034552/http://www.cacti.net/cactid_download.php vulncheck.com: https://www.vulncheck.com/advisories/cacti-graph-view-rce
Credits
David Maciejak