CVE-2023-39357
Cacti vulnerability analysis and mitigation

Overview

A defect in the sql_save function was discovered in Cacti version 1.2.24 and earlier. When the column type is numeric, the sql_save function directly utilizes user input without proper validation. Many files and functions calling the sql_save function do not perform prior validation of user input, leading to multiple SQL injection vulnerabilities. This vulnerability was discovered in September 2023 and has been assigned CVE-2023-39357. The issue affects Cacti's operational monitoring and fault management framework (GitHub Advisory).

Technical details

The vulnerability exists in the sql_save function where numeric column types (int, float, double, or decimal) are handled without proper input validation. When processing these numeric fields, the function directly incorporates user input into SQL statements through the $array_items array, which is later used by the _db_replace function. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (GitHub Advisory).

Impact

The vulnerability allows authenticated users to exploit SQL injection vulnerabilities to perform privilege escalation and remote code execution. Since the application accepts stacked queries, attackers can potentially achieve remote code execution by modifying the 'path_php_binary' value in the database, compromising the system's integrity and confidentiality (GitHub Advisory, Security Online).

Mitigation and workarounds

The vulnerability has been fixed in Cacti version 1.2.25. Users are strongly advised to upgrade to this version or later. There are no known workarounds for this vulnerability other than upgrading to the patched version (GitHub Advisory, Debian Security).

Community reactions

Multiple Linux distributions have released security advisories and patches for this vulnerability, including Debian and Fedora. Debian released DSA-5550-1 and DLA-3765-1 to address this vulnerability along with other security issues in Cacti (Debian LTS, Fedora Update).

Additional resources


SourceThis report was generated using AI

Related Cacti vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-26520CRITICAL9.8
  • CactiCacti
  • cacti
NoYesFeb 12, 2025
CVE-2005-10004HIGH8.7
  • CactiCacti
  • cacti
NoYesAug 30, 2025
CVE-2025-24367HIGH8.7
  • CactiCacti
  • cacti
NoYesJan 27, 2025
CVE-2025-66399HIGH7.4
  • CactiCacti
  • cacti
NoYesDec 02, 2025
CVE-2025-24368MEDIUM6.9
  • CactiCacti
  • cacti
NoYesJan 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management