CVE-2026-26991
LibreNMS vulnerable to Stored Cross-site Scripting through unsanitized /device-groups name
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the device group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a device group, an HTTP POST request is sent to the Request-URI "/device-groups". The name of the newly created device group is stored in the value of the name parameter. After the device group is created, the entry is displayed along with relevant buttons such as Rediscover Devices, Edit, and Delete. This issue has been fixed in version 26.2.0.
| CWE | CWE-79 |
| Vendor | librenms |
| Product | librenms |
| Published | Feb 20, 2026 |
| Last Updated | Feb 20, 2026 |
Stay Ahead of the Next One
Get instant alerts for librenms librenms
Be the first to know when new unknown vulnerabilities affecting librenms librenms are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
librenms / librenms
< 26.2.0
References
github.com: https://github.com/librenms/librenms/security/advisories/GHSA-5pqf-54qp-32wx github.com: https://github.com/librenms/librenms/pull/19041 github.com: https://github.com/librenms/librenms/commit/64b31da444369213eb4559ec1c304ebfaa0ba12c github.com: https://github.com/librenms/librenms/releases/tag/26.2.0