LibreNMS has Stored Cross-Site Scripting via unsanitized /port-groups name
Description
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
librenms/librenmsPackagist | < 26.2.0 | 26.2.0 |
Affected products
1Patches
1882fe6f90ea5Fix port group delete xss (#19042)
1 file changed · +4 −2
resources/views/port-group/index.blade.php+4 −2 modified@@ -37,7 +37,8 @@ href="{{ route('port-groups.edit', $port_group->id) }}"> <i class="fa fa-pencil" aria-hidden="true"></i></a> <button type="button" class="btn btn-danger btn-sm" title="{{ __('delete Port Group') }}" aria-label="{{ __('Delete') }}" - onclick="delete_pg(this, '{{ $port_group->name }}', '{{ route('port-groups.destroy', $port_group->id) }}')"> + data-group-name="{{ $port_group->name }}" + onclick="delete_pg(this, '{{ route('port-groups.destroy', $port_group->id) }}')"> <i class="fa fa-trash" aria-hidden="true"></i></button> </td> @@ -52,8 +53,9 @@ class="fa fa-trash" aria-hidden="true"></i></button> @section('scripts') <script> - function delete_pg(button, name, url) { + function delete_pg(button, url) { var index = button.parentNode.parentNode.rowIndex; + var name = button.dataset.groupName; if (confirm('{{ __('Are you sure you want to delete ') }}' + name + '?')) { $.ajax({
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
6- github.com/advisories/GHSA-93fx-g747-695xghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-26992ghsaADVISORY
- github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699fghsax_refsource_MISCWEB
- github.com/librenms/librenms/pull/19042ghsax_refsource_MISCWEB
- github.com/librenms/librenms/releases/tag/26.2.0ghsax_refsource_MISCWEB
- github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695xghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.