First published: Mon Jan 27 2025(Updated: )
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cacti | <1.2.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-24368 has a high severity rating due to its potential for SQL injection attacks.
To fix CVE-2025-24368, upgrade to Cacti version 1.2.30 or later where the vulnerability is patched.
CVE-2025-24368 affects Cacti versions up to 1.2.29 exclusively.
CVE-2025-24368 is a SQL injection vulnerability that can expose sensitive data.
The vulnerability in CVE-2025-24368 involves the automation_tree_rules.php file and its interaction with the build_rule_item_filter() function.