LibreNMS is vulnerable to Reflected-XSS in `report_this` function
Moderate severity
GitHub Reviewed
Published
Oct 13, 2025
in
librenms/librenms
•
Updated Oct 14, 2025
Description
Published to the GitHub Advisory Database
Oct 13, 2025
Reviewed
Oct 13, 2025
Published by the National Vulnerability Database
Oct 13, 2025
Last updated
Oct 14, 2025
Summary
Reflected-XSS in
report_this
function inlibrenms/includes/functions.php
Details
Recently, it was discovered that the
report_this
function had improper filtering (htmlentities
function was incorrectly used in a href environment), which caused theproject_issues
parameter to trigger an XSS vulnerability.The Vulnerable Sink:
https://github.com/librenms/librenms/blob/master/includes/functions.php#L444
PoC
GET
project_issues=javascript:alert(document.cookie)
Impact
XSS vulnerabilities allow attackers to execute malicious scripts in users' browsers, enabling unauthorized access to sensitive data, session hijacking, or malware distribution.
Suggestion
It is recommended to filter dangerous protocols, e.g.
javascript:
/file:
.References