CVE-2024-54146

HIGH
2025-01-27 [email protected]
7.6
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 28, 2026 - 18:05 vuln.today
Patch Released
Mar 28, 2026 - 18:05 nvd
Patch available
PoC Detected
Mar 04, 2025 - 16:57 vuln.today
Public exploit code
CVE Published
Jan 27, 2025 - 17:15 nvd
HIGH 7.6

Description

Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29.

Analysis

Cacti is an open source performance and fault management framework. Rated high severity (CVSS 7.6), this vulnerability is remotely exploitable, low attack complexity. Public exploit code available.

Technical Context

This vulnerability is classified as SQL Injection (CWE-89), which allows attackers to execute arbitrary SQL commands against the database. Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29. Affected products include: Cacti.

Affected Products

Cacti.

Remediation

A vendor patch is available. Apply the latest security update as soon as possible. Use parameterized queries/prepared statements. Never concatenate user input into SQL. Apply least-privilege database permissions.

Priority Score

68
Low Medium High Critical
KEV: 0
EPSS: +9.8
CVSS: +38
POC: +20

Vendor Status

Share

CVE-2024-54146 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy