EUVD-2025-200287

| CVE-2025-66399 HIGH
2025-12-02 [email protected]
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

5
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
EUVD ID Assigned
Mar 15, 2026 - 14:04 euvd
EUVD-2025-200287
Analysis Generated
Mar 15, 2026 - 14:04 vuln.today
PoC Detected
Dec 05, 2025 - 18:57 vuln.today
Public exploit code
CVE Published
Dec 02, 2025 - 18:15 nvd
HIGH 8.8

Description

Cacti is an open source performance and fault management framework. Prior to 1.2.29, there is an input-validation flaw in the SNMP device configuration functionality. An authenticated Cacti user can supply crafted SNMP community strings containing control characters (including newlines) that are accepted, stored verbatim in the database, and later embedded into backend SNMP operations. In environments where downstream SNMP tooling or wrappers interpret newline-separated tokens as command boundaries, this can lead to unintended command execution with the privileges of the Cacti process. This vulnerability is fixed in 1.2.29.

Analysis

Cacti is an open source performance and fault management framework. Prior to 1.2.29, there is an input-validation flaw in the SNMP device configuration functionality. An authenticated Cacti user can supply crafted SNMP community strings containing control characters (including newlines) that are accepted, stored verbatim in the database, and later embedded into backend SNMP operations. In environments where downstream SNMP tooling or wrappers interpret newline-separated tokens as command boundaries, this can lead to unintended command execution with the privileges of the Cacti process. This vulnerability is fixed in 1.2.29.

Technical Context

Command injection allows an attacker to execute arbitrary OS commands on the host system through a vulnerable application that passes user input to system shells.

Affected Products

Affected products: Cacti Cacti

Remediation

Avoid passing user input to system commands. Use language-specific APIs instead of shell commands. If unavoidable, use strict input validation and escaping.

Priority Score

64
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +44
POC: +20

Vendor Status

Ubuntu

Priority: Medium
cacti
Release Status Version
noble needs-triage -
plucky ignored end of life, was needs-triage
questing not-affected 1.2.30+ds1-1ubuntu1
upstream released 1.2.30+ds1-1
trusty needs-triage -
xenial needs-triage -
bionic needs-triage -
focal needs-triage -
jammy needs-triage -

Debian

cacti
Release Status Fixed Version Urgency
bullseye vulnerable 1.2.16+ds1-2+deb11u3 -
bullseye (security) vulnerable 1.2.16+ds1-2+deb11u5 -
bookworm, bookworm (security) vulnerable 1.2.24+ds1-1+deb12u5 -
forky, trixie fixed 1.2.30+ds1-1 -
sid fixed 1.2.30+ds1-2 -
(unstable) fixed 1.2.30+ds1-1 -

Share

EUVD-2025-200287 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy