CVE-2025-65093
PHP Análisis y mitigación de vulnerabilidades

Vista general

LibreNMS, an auto-discovering PHP/MySQL/SNMP based network monitoring tool, contains a Boolean-Based Blind SQL Injection vulnerability (CVE-2025-65093) in version 25.10.0. The vulnerability exists in the /ajax_output.php endpoint where the hostname parameter is vulnerable to SQL injection. This security issue was discovered and reported by marcelomulder and was published on November 18, 2025 (GitHub Advisory).

Técnicas

The vulnerability exists in the hostname parameter at the /ajax_output.php endpoint. The issue occurs because user-supplied data is concatenated directly into SQL queries within /opt/librenms/includes/html/output/capture.inc.php without proper sanitization. The vulnerability is classified as a Boolean-Based Blind SQL Injection, where attackers can infer database information through conditional responses. The CVSS score is 5.5 (Moderate), with a vector string of CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N (GitHub Advisory).

Impacto

The vulnerability can lead to several serious consequences: data extraction through Boolean inference techniques, potential system compromise through database manipulation, and information disclosure revealing internal SQL structure and logic of the LibreNMS backend. However, the impact is somewhat limited as the vulnerability requires administrator privileges to exploit (GitHub Advisory).

Mitigación y soluciones alternativas

As of the advisory publication, no official patch has been released for version 25.10.0. Organizations running affected versions should implement additional security controls to restrict access to the vulnerable endpoint and monitor for suspicious SQL queries (GitHub Advisory).

Recursos adicionales


FuenteEste informe se generó utilizando IA

Relacionado PHP Vulnerabilidades:

CVE ID

Severidad

Puntuación

Tecnologías

Nombre del componente

Exploit de CISA KEV

Tiene arreglo

Fecha de publicación

CVE-2025-65103HIGH8.8
  • PHPPHP
  • devcode-it/openstamanager
NoNov 19, 2025
CVE-2025-65013MEDIUM6.2
  • PHPPHP
  • librenms/librenms
NoNov 18, 2025
CVE-2025-65093MEDIUM5.5
  • PHPPHP
  • librenms/librenms
NoNoNov 18, 2025
CVE-2025-65012MEDIUM5.1
  • PHPPHP
  • getkirby/cms
NoNov 18, 2025
CVE-2025-65014LOW3.7
  • PHPPHP
  • librenms/librenms
NoNov 18, 2025

Evaluación gratuita de vulnerabilidades

Compare su postura de seguridad en la nube

Evalúe sus prácticas de seguridad en la nube en 9 dominios de seguridad para comparar su nivel de riesgo e identificar brechas en sus defensas.

Solicitar evaluación

Recursos adicionales de Wiz

Obtén una demostración personalizada

¿Listo para ver a Wiz en acción?

"La mejor experiencia de usuario que he visto en mi vida, proporciona una visibilidad completa de las cargas de trabajo en la nube."
David EstlickCISO
"Wiz proporciona un panel único para ver lo que ocurre en nuestros entornos en la nube."
Adam FletcherJefe de Seguridad
"Sabemos que si Wiz identifica algo como crítico, en realidad lo es."
Greg PoniatowskiJefe de Gestión de Amenazas y Vulnerabilidades