Loading HuntDB...

GHSA-2f4w-6mc7-4w78

GitHub Security Advisory

LibreNMS Display Name 2 Stored Cross-site Scripting vulnerability

✓ GitHub Reviewed MODERATE Has CVE

Advisory Details

# StoredXSS-LibreNMS-Display Name 2

**Description:**

XSS on the parameters (Replace $DEVICE_ID with your specific $DEVICE_ID value):`/device/$DEVICE_ID/edit` -> param: display

of Librenms versions 24.11.0 ([https://github.com/librenms/librenms](https://github.com/librenms/librenms)) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.

**Proof of Concept:**
1. Add a new device through the LibreNMS interface.
2. Edit the newly created device by going to the "Device Settings" section.
3. In the "Display Name" field, enter the following payload: `"><img src onerror="alert(document.cookie)">`.
![image](https://github.com/user-attachments/assets/b1664e15-eba8-4cdd-b730-fb18936f109c)
4. Save the changes.
5. The XSS payload is triggered when navigating to the path /device/$DEVICE_ID/logs and hovering over a type containing a tag (such as Core 1 in the image).
![image](https://github.com/user-attachments/assets/df23cec8-94bb-4155-961b-52ea659654a2)

**Impact:**

Execution of Malicious Code

Affected Packages

Packagist librenms/librenms
Affected versions: 24.11.10 (fixed in 24.12.0)

Related CVEs

Key Information

GHSA ID
GHSA-2f4w-6mc7-4w78
Published
January 16, 2025 5:18 PM
Last Modified
April 28, 2025 6:32 PM
CVSS Score
5.0 /10
Primary Ecosystem
Packagist
Primary Package
librenms/librenms
GitHub Reviewed
✓ Yes

Dataset

Last updated: November 26, 2025 6:30 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.