Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2021-26247 — Cross-site Scripting in Cacti
Severity
6.1MEDIUMNVD
EPSS
21.0%
top 4.34%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJan 19
Latest updateJan 20
Description
As an unauthenticated remote user, visit "http:///auth_changepassword.php?ref=alert(1)" to successfully execute the JavaScript payload present in the "ref" URL parameter.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7
Affected Packages3 packages
🔴Vulnerability Details
2💥Exploits & PoCs
1Nuclei▶
Cacti - Cross-Site Scripting
📋Vendor Advisories
1Debian▶
CVE-2021-26247: cacti - As an unauthenticated remote user, visit "http://<CACTI_SERVER>/auth_changepassw...↗2021