Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2024-25641Improper Input Validation in Cacti

Severity
7.2HIGHNVD
CNA9.1
EPSS
88.4%
top 0.50%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 14
Latest updateApr 15

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML dat

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploitability: 1.2 | Impact: 5.9

Affected Packages4 packages

CVEListV5cacti/cacti< 1.2.27
NVDcacti/cacti< 1.2.27
Debiancacti/cacti< 1.2.16+ds1-2+deb11u4+3
Ubuntucacti/cacti< 1.2.10+ds1-1ubuntu1.1+5

Also affects: Fedora 39

Patches

🔴Vulnerability Details

3
OSV
cacti vulnerabilities2024-08-20
OSV
CVE-2024-25641: Cacti provides an operational monitoring and fault management framework2024-05-14
CVEList
Cacti RCE vulnerability when importing packages2024-05-13

💥Exploits & PoCs

2
Exploit-DB
Cacti 1.2.26 - Remote Code Execution (RCE) (Authenticated)2025-04-15
Metasploit
Cacti Import Packages RCE

📋Vendor Advisories

2
Ubuntu
Cacti vulnerabilities2024-08-20
Debian
CVE-2024-25641: cacti - Cacti provides an operational monitoring and fault management framework. Prior t...2024