Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
References
Configurations
History
03 Nov 2025, 21:19
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
|
| References | () https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 - Patch | |
| References | () https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36 - Exploit, Vendor Advisory | |
| CPE | cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* | |
| First Time |
Cacti
Cacti cacti |
27 Jan 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-01-27 17:15
Updated : 2025-11-03 21:19
NVD link : CVE-2025-22604
Mitre link : CVE-2025-22604
CVE.ORG link : CVE-2025-22604
JSON object : View
Products Affected
cacti
- cacti
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
