LibreNMS has a Stored XSS vulnerability in its Alert Transport name field
Moderate severity
GitHub Reviewed
Published
Oct 16, 2025
in
librenms/librenms
•
Updated Oct 16, 2025
Description
Published to the GitHub Advisory Database
Oct 16, 2025
Reviewed
Oct 16, 2025
Published by the National Vulnerability Database
Oct 16, 2025
Last updated
Oct 16, 2025
Summary
LibreNMS <= 25.8.0 contains a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Transports management functionality. When an administrator creates a new Alert Transport, the value of the
Transport name
field is stored and later rendered in the Transports column of the Alert Rules page without proper input validation or output encoding. This leads to arbitrary JavaScript execution in the admin’s browser.Details
Transport name
field in/alert-transports
./alert-rules
.Steps to reproduce
Log in with an administrator account.
Navigate to:
Click Create alert transport and provide the following values:
Transport name:
Default Alert:
ON
Email:
[email protected]
(or any valid email)Save the transport.
Navigate to
http://localhost:8000/alert-rules
. A popupalert(1)
is triggered, confirming that the payload executes.Impact
Only accounts with the admin role who access the Alert Rules page (
http://localhost:8000/alert-rules
) are affected.References