CVE-2024-25641

9.1 CRITICAL
Published: May 14, 2024 Modified: November 04, 2025

Description

Cacti provides an operational monitoring and fault management framework. Prior to version 1.2.27, an arbitrary file write vulnerability, exploitable through the "Package Import" feature, allows authenticated users having the "Import Templates" permission to execute arbitrary PHP code on the web server. The vulnerability is located within the `import_package()` function defined into the `/lib/import.php` script. The function blindly trusts the filename and file content provided within the XML data, and writes such files into the Cacti base path (or even outside, since path traversal sequences are not filtered). This can be exploited to write or overwrite arbitrary files on the web server, leading to execution of arbitrary PHP code or other security impacts. Version 1.2.27 contains a patch for this issue.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://seclists.org/fulldisclosure/2024/May/6
Source: security-advisories@github.com
Mailing List Third Party Advisory
https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88
Source: security-advisories@github.com
Exploit Vendor Advisory
http://seclists.org/fulldisclosure/2024/May/6
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://github.com/Cacti/cacti/security/advisories/GHSA-7cmj-g5qc-pj88
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory

9 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.1 / 10.0
EPSS (Exploit Probability)
88.6%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

fedoraproject cacti