๐Ÿ” CVE Alert

CVE-2023-49088

MEDIUM 6.1

Cacti has incomplete fix for CVE-2023-39515

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

Cacti is an open source operational monitoring and fault management framework. The fix applied for CVE-2023-39515 in version 1.2.25 is incomplete as it enables an adversary to have a victim browser execute malicious code when a victim user hovers their mouse over the malicious data source path in `data_debug.php`. To perform the cross-site scripting attack, the adversary needs to be an authorized cacti user with the following permissions: `General Administration>Sites/Devices/Data`. The victim of this attack could be any account with permissions to view `http://<HOST>/cacti/data_debug.php`. As of time of publication, no complete fix has been included in Cacti.

CWE CWE-79
Vendor cacti
Product cacti
Published Dec 22, 2023
Last Updated Feb 25, 2026
Stay Ahead of the Next One

Get instant alerts for cacti cacti

Be the first to know when new medium vulnerabilities affecting cacti cacti are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Cacti / cacti
<= 1.2.25

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/Cacti/cacti/security/advisories/GHSA-q7g7-gcf6-wh4x github.com: https://github.com/Cacti/cacti/security/advisories/GHSA-hrg9-qqqx-wc4h github.com: https://github.com/Cacti/cacti/blob/5f6f65c215d663a775950b2d9db35edbaf07d680/data_debug.php lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/03/msg00018.html lists.fedoraproject.org: https://lists.fedoraproject.org/archives/list/[email protected]/message/RBEOAFKRARQHTDIYSL723XAFJ2Q6624X/