We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. LibreNMS versions 25.6.0 and below contain an architectural vulnerability in the ajax_form.php endpoint that permits Remote File Inclusion based on user-controlled POST input. The application directly uses the type parameter to dynamically include .inc.php files from the trusted path includes/html/forms/, without validation or allowlisting. This pattern introduces a latent Remote Code Execution (RCE) vector if an attacker can stage a file in this include path — for example, via symlink, development misconfiguration, or chained vulnerabilities. This is fixed in version 25.7.0.
Reserved 2025-07-16 | Published 2025-07-22 | Updated 2025-07-22 | Assigner GitHub_Mgithub.com/...brenms/security/advisories/GHSA-gq96-8w38-hhj2
github.com/librenms/librenms/pull/17990
github.com/...ommit/ec89714d929ef0cf2321957ed9198b0f18396c81
github.com/librenms/librenms/releases/tag/25.7.0
Support options