Cyber Posture

CVE-2025-26520

High

Published: 12 February 2025

Published
12 February 2025
Modified
03 March 2025
KEV Added
Patch
CVSS Score 7.6 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
EPSS Score 0.0007 20.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-26520 is a high-severity SQL Injection (CWE-89) vulnerability in Cacti Cacti. Its CVSS base score is 7.6 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2025-26520 by requiring timely application of the specific Cacti patch that completes the SQL injection fix in host_templates.php.

prevent

Prevents SQL injection exploitation by enforcing validation and sanitization of the graph_template parameter in the template function.

detect

Enables detection of the SQL injection vulnerability in Cacti through regular automated scanning, facilitating proactive remediation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The remote SQL injection in the Cacti web application directly enables exploitation of a public-facing application by authenticated low-privilege attackers.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.

Deeper analysisAI

CVE-2025-26520 is a SQL injection vulnerability (CWE-89) affecting Cacti versions through 1.2.29. The flaw resides in the template function within host_templates.php, where the graph_template parameter is insufficiently sanitized, allowing malicious SQL payloads. This issue stems from an incomplete fix for the prior CVE-2024-54146 and carries a CVSS v3.1 base score of 7.6 (AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H).

The vulnerability can be exploited remotely by an authenticated attacker with low privileges, requiring no user interaction. Successful exploitation enables limited confidentiality and integrity impacts, such as reading or modifying minor data, alongside high availability disruption, potentially leading to denial-of-service conditions through database manipulation.

Mitigation is addressed in Cacti commit 7fa60c03ad4a69c701ac6b77c85a8927df7acd51 and pull request #6096 on the project's GitHub repository. Security practitioners should apply this patch or upgrade to a version incorporating the fix to prevent exploitation.

Details

CWE(s)

Affected Products

cacti
cacti
≤ 1.2.29

CVEs Like This One

CVE-2024-54146Same product: Cacti Cacti
CVE-2024-54145Same product: Cacti Cacti
CVE-2025-24368Same product: Cacti Cacti
CVE-2025-22604Same product: Cacti Cacti
CVE-2025-24367Same product: Cacti Cacti
CVE-2025-66399Same product: Cacti Cacti
CVE-2005-10004Same product: Cacti Cacti
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-32458Shared CWE-89

References