Name | CVE-2025-24367 |
Description | Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-4048-1, DSA-5862-1 |
Debian Bugs | 1094574 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
cacti (PTS) | bullseye | 1.2.16+ds1-2+deb11u3 | vulnerable |
| bullseye (security) | 1.2.16+ds1-2+deb11u5 | fixed |
| bookworm | 1.2.24+ds1-1+deb12u4 | vulnerable |
| bookworm (security) | 1.2.24+ds1-1+deb12u5 | fixed |
| sid, trixie | 1.2.28+ds1-4 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://github.com/Cacti/cacti/security/advisories/GHSA-fxrq-fr7h-9rqq
Fixed by: https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0
Negligible security impact as exploitability depends on writable web root for cacti