LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation. This issue has been fixed in version 26.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1 | Patch |
| https://github.com/librenms/librenms/pull/18777 | Issue Tracking |
| https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcv | Exploit Third Party Advisory |
Configurations
History
20 Feb 2026, 16:31
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.1 |
| References | () https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1 - Patch | |
| References | () https://github.com/librenms/librenms/pull/18777 - Issue Tracking | |
| References | () https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcv - Exploit, Third Party Advisory | |
| First Time |
Librenms librenms
Librenms |
|
| CPE | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* |
20 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 02:16
Updated : 2026-02-20 16:31
NVD link : CVE-2026-26988
Mitre link : CVE-2026-26988
CVE.ORG link : CVE-2026-26988
JSON object : View
Products Affected
librenms
- librenms
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
