First published: Mon Jan 27 2025(Updated: )
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <1.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24367 has a high severity rating due to its potential for remote code execution on affected systems.
To fix CVE-2025-24367, upgrade your Cacti installation to version 1.2.30 or later.
CVE-2025-24367 affects authenticated users of Cacti versions prior to 1.2.30.
CVE-2025-24367 allows an attacker to exploit graph functionality to execute arbitrary PHP scripts, potentially compromising the server.
Mitigation without upgrading is minimal, but limiting user permissions may reduce the risk of exploitation.