Home

Description

A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.

PUBLISHED Reserved 2025-04-22 | Published 2026-01-29 | Updated 2026-02-02 | Assigner mitre

References

github.com/Cacti/cacti

gist.github.com/BEND0US/49d76897a5bb676d8c3f51425553cc32

cve.org (CVE-2025-45160)

nvd.nist.gov (CVE-2025-45160)

Download JSON