Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-26247Cross-site Scripting in Cacti

Severity
6.1MEDIUMNVD
EPSS
21.0%
top 4.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 19
Latest updateJan 20

Description

As an unauthenticated remote user, visit "http:///auth_changepassword.php?ref=alert(1)" to successfully execute the JavaScript payload present in the "ref" URL parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

debiandebian/cacti< cacti 0.8.7i-1 (bookworm)
Debiancacti/cacti< 0.8.7i-1+3
NVDcacti/cacti0.8.7g

🔴Vulnerability Details

2
GHSA
GHSA-cvpj-w72w-rchg: As an unauthenticated remote user, visit "http:///auth_changepassword2022-01-20
OSV
CVE-2021-26247: As an unauthenticated remote user, visit "http:///auth_changepassword2022-01-19

💥Exploits & PoCs

1
Nuclei
Cacti - Cross-Site Scripting

📋Vendor Advisories

1
Debian
CVE-2021-26247: cacti - As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassw...2021

🕵️Threat Intelligence

1
Greynoiseio
NoiseLetter September 2025