Home

Description

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation. This issue has been fixed in version 26.2.0.

PUBLISHED Reserved 2026-02-17 | Published 2026-02-20 | Updated 2026-02-20 | Assigner GitHub_M




CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 26.2.0
affected

References

github.com/...brenms/security/advisories/GHSA-h3rv-q4rq-pqcv

github.com/librenms/librenms/pull/18777

github.com/...ommit/15429580baba03ed1dd377bada1bde4b7a1175a1

cve.org (CVE-2026-26988)

nvd.nist.gov (CVE-2026-26988)

Download JSON