Before Setting: Enable 'distributed_poller' in http://localhost/settings/poller/distributed 1. Attacker creates a new poller group and injects the payload in the 'group name' parameter
payload: <script>alert('XSS')</script>
2. Victim navigates to the 'http://localhost/addhost' to add a new host 3. The payload is executed
code sink: https://github.com/librenms/librenms/blob/25.4.0/includes/html/pages/addhost.inc.php#L284
{ "github_reviewed_at": "2025-05-19T16:22:53Z", "severity": "LOW", "nvd_published_at": "2025-05-17T16:15:19Z", "cwe_ids": [ "CWE-79" ], "github_reviewed": true }