CVE-2025-24368
Published: 27 January 2025
Summary
CVE-2025-24368 is a high-severity SQL Injection (CWE-89) vulnerability in Cacti Cacti. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Data from Local System (T1005); ranked at the 29.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mandates thorough input validation at points like automation_tree_rules.php data before SQL concatenation in build_rule_item_filter(), preventing SQL injection exploitation.
Requires timely remediation of the specific SQL injection flaw through patching to Cacti 1.2.29, eliminating the vulnerable code path.
Boundary protection via web application firewalls monitors and blocks malicious SQL payloads targeting the remote unauthenticated vulnerable endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection enables arbitrary SQL execution for database modification and collection (T1213.006), local file reads (T1005), exploitation of the public-facing web app (T1190), and RCE via file writes such as web shells (T1505.003).
NVD Description
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability…
more
is fixed in 1.2.29.
Deeper analysisAI
CVE-2025-24368 is a SQL injection vulnerability in Cacti, an open-source performance and fault management framework. The issue arises because data stored in automation_tree_rules.php is not thoroughly validated before being concatenated into SQL statements by the build_rule_item_filter() function in lib/api_automation.php. It affects Cacti versions prior to 1.2.29 and has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N), mapped to CWE-89.
Remote unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction. Successful exploitation allows attackers to inject malicious SQL payloads, enabling high-impact integrity violations such as unauthorized data modification in the database.
The vulnerability is fixed in Cacti version 1.2.29, as detailed in the GitHub commit c7e4ee798d263a3209ae6e7ba182c7b65284d8f0 and GHSA advisory GHSA-f9c7-7rc3-574c. Debian LTS users are advised to update affected packages per the announcement at lists.debian.org/debian-lts-announce/2025/02/msg00010.html. Security practitioners should apply the patch promptly and review access to automation features.
Details
- CWE(s)