LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. In versions 26.1.1 and below, the port group name is not sanitized, allowing attackers with admin privileges to perform Stored Cross-Site Scripting (XSS) attacks. When a user adds a port group, an HTTP POST request is sent to the Request-URI "/port-groups". The name of the newly created port group is stored in the value of the name parameter. After the port group is created, the entry is displayed along with relevant buttons such as Edit and Delete. This issue has been fixed in version 26.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699f | Patch |
| https://github.com/librenms/librenms/pull/19042 | Issue Tracking |
| https://github.com/librenms/librenms/releases/tag/26.2.0 | Product Release Notes |
| https://github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695x | Exploit Third Party Advisory |
Configurations
History
20 Feb 2026, 16:20
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:* | |
| First Time |
Librenms librenms
Librenms |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.8 |
| References | () https://github.com/librenms/librenms/commit/882fe6f90ea504a3732f83caf89bba7850a5699f - Patch | |
| References | () https://github.com/librenms/librenms/pull/19042 - Issue Tracking | |
| References | () https://github.com/librenms/librenms/releases/tag/26.2.0 - Product, Release Notes | |
| References | () https://github.com/librenms/librenms/security/advisories/GHSA-93fx-g747-695x - Exploit, Third Party Advisory | |
| Summary |
|
20 Feb 2026, 03:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-20 03:16
Updated : 2026-02-20 16:20
NVD link : CVE-2026-26992
Mitre link : CVE-2026-26992
CVE.ORG link : CVE-2026-26992
JSON object : View
Products Affected
librenms
- librenms
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
