CVE-2025-65014

LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Prior to version 25.11.0, a weak password policy vulnerability was identified in the user management functionality of the LibreNMS application. This vulnerability allows administrators to create accounts with extremely weak and predictable passwords, such as 12345678. This exposes the platform to brute-force and credential stuffing attacks. This issue has been patched in version 25.11.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*

History

20 Nov 2025, 16:17

Type Values Removed Values Added
References () https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g - () https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g - Exploit, Mitigation, Vendor Advisory
First Time Librenms librenms
Librenms
CPE cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*

19 Nov 2025, 15:15

Type Values Removed Values Added
References () https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g - () https://github.com/librenms/librenms/security/advisories/GHSA-5mrf-j8v6-f45g -

18 Nov 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-11-18 23:15

Updated : 2025-11-20 16:17


NVD link : CVE-2025-65014

Mitre link : CVE-2025-65014

CVE.ORG link : CVE-2025-65014


JSON object : View

Products Affected

librenms

  • librenms
CWE
CWE-521

Weak Password Requirements