VYPR
Moderate severityNVD Advisory· Published Feb 20, 2026· Updated Feb 20, 2026

LibreNMS has Stored Cross-Site Scripting via unsanitized /port-groups name

CVE-2026-26992

Description

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
librenms/librenmsPackagist
< 26.2.026.2.0

Affected products

1

Patches

1
882fe6f90ea5

Fix port group delete xss (#19042)

https://github.com/librenms/librenmsTony MurrayFeb 16, 2026via ghsa
1 file changed · +4 2
  • resources/views/port-group/index.blade.php+4 2 modified
    @@ -37,7 +37,8 @@
                                        href="{{ route('port-groups.edit', $port_group->id) }}">
                                         <i class="fa fa-pencil" aria-hidden="true"></i></a>
                                     <button type="button" class="btn btn-danger btn-sm" title="{{ __('delete Port Group') }}" aria-label="{{ __('Delete') }}"
    -                                        onclick="delete_pg(this, '{{ $port_group->name }}', '{{ route('port-groups.destroy', $port_group->id) }}')">
    +                                        data-group-name="{{ $port_group->name }}"
    +                                        onclick="delete_pg(this, '{{ route('port-groups.destroy', $port_group->id) }}')">
                                         <i
                                             class="fa fa-trash" aria-hidden="true"></i></button>
                                 </td>
    @@ -52,8 +53,9 @@ class="fa fa-trash" aria-hidden="true"></i></button>
     
     @section('scripts')
         <script>
    -        function delete_pg(button, name, url) {
    +        function delete_pg(button, url) {
                 var index = button.parentNode.parentNode.rowIndex;
    +            var name = button.dataset.groupName;
     
                 if (confirm('{{ __('Are you sure you want to delete ') }}' + name + '?')) {
                     $.ajax({
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.