Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.
References
| Link | Resource |
|---|---|
| https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 | Patch |
| https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c | Exploit Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2025/02/msg00010.html | |
| https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c | Exploit Third Party Advisory |
Configurations
History
03 Nov 2025, 22:18
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Information
Published : 2025-01-27 18:15
Updated : 2025-11-03 22:18
NVD link : CVE-2025-24368
Mitre link : CVE-2025-24368
CVE.ORG link : CVE-2025-24368
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
