We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-54138

LibreNMS has Authenticated Local File Inclusion in ajax_form.php that Allows RCE



Description

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring which includes support for a wide range of network hardware and operating systems. LibreNMS versions 25.6.0 and below contain an architectural vulnerability in the ajax_form.php endpoint that permits Remote File Inclusion based on user-controlled POST input. The application directly uses the type parameter to dynamically include .inc.php files from the trusted path includes/html/forms/, without validation or allowlisting. This pattern introduces a latent Remote Code Execution (RCE) vector if an attacker can stage a file in this include path — for example, via symlink, development misconfiguration, or chained vulnerabilities. This is fixed in version 25.7.0.

Reserved 2025-07-16 | Published 2025-07-22 | Updated 2025-07-22 | Assigner GitHub_M


HIGH: 7.5CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

Product status

< 25.7.0
affected

References

github.com/...brenms/security/advisories/GHSA-gq96-8w38-hhj2

github.com/librenms/librenms/pull/17990

github.com/...ommit/ec89714d929ef0cf2321957ed9198b0f18396c81

github.com/librenms/librenms/releases/tag/25.7.0

cve.org (CVE-2025-54138)

nvd.nist.gov (CVE-2025-54138)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-54138

Support options

Helpdesk Chat, Email, Knowledgebase