XSS on the parameters:/addhost
-> param: community
of Librenms versions 24.10.1 (https://github.com/librenms/librenms) allows remote attackers to inject malicious scripts. When a user views or interacts with the page displaying the data, the malicious script executes immediately, leading to potential unauthorized actions or data exposure.
Proof of Concept:
1. Navigate to the /addhost path.
2. Fill in all required fields.
3. In the Community field, enter the following payload: "><img src=a onerror="alert(1)">
.
Impact:
Execution of Malicious Code
{ "nvd_published_at": "2025-01-16T23:15:08Z", "cwe_ids": [ "CWE-79" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2025-01-16T17:33:10Z" }