CVE-2023-49085
Cacti SQL Injection vulnerability
CVSS Score
8.8
EPSS Score
0.0%
EPSS Percentile
0th
Cacti provides an operational monitoring and fault management framework. In versions 1.2.25 and prior, it is possible to execute arbitrary SQL code through the `pollers.php` script. An authorized user may be able to execute arbitrary SQL code. The vulnerable component is the `pollers.php`. Impact of the vulnerability - arbitrary SQL code execution. As of time of publication, a patch does not appear to exist.
| CWE | CWE-89 |
| Vendor | cacti |
| Product | cacti |
| Published | Dec 22, 2023 |
| Last Updated | Feb 25, 2026 |
Stay Ahead of the Next One
Get instant alerts for cacti cacti
Be the first to know when new high vulnerabilities affecting cacti cacti are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
Cacti / cacti
<= 1.2.25
References
github.com: https://github.com/Cacti/cacti/security/advisories/GHSA-vr3c-38wh-g855 github.com: https://github.com/Cacti/cacti/blob/5f6f65c215d663a775950b2d9db35edbaf07d680/pollers.php#L451 packetstormsecurity.com: http://packetstormsecurity.com/files/176995/Cacti-pollers.php-SQL-Injection-Remote-Code-Execution.html lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/