Skip to content

Instantly share code, notes, and snippets.

@alon710
Created March 11, 2026 12:10
Show Gist options
  • Select an option

  • Save alon710/90d4653c1f3204acd98b3c7dd62773cd to your computer and use it in GitHub Desktop.

Select an option

Save alon710/90d4653c1f3204acd98b3c7dd62773cd to your computer and use it in GitHub Desktop.
CVE-2026-26988: CVE-2026-26988: Critical SQL Injection in LibreNMS ajax_table.php Endpoint - CVE Security Report

CVE-2026-26988: CVE-2026-26988: Critical SQL Injection in LibreNMS ajax_table.php Endpoint

CVSS Score: 9.1 Published: 2026-02-20 Full Report: https://cvereports.com/reports/CVE-2026-26988

Summary

LibreNMS versions up to 25.12.0 are vulnerable to an unauthenticated SQL injection in the address search functionality. The flaw allows remote attackers to execute arbitrary database queries via the ajax_table.php endpoint.

TL;DR

Unauthenticated SQL injection in LibreNMS IPv6 search allows arbitrary database compromise. Fixed in version 26.2.0 by migrating to parameterized Laravel controllers.

Exploit Status: POC

Technical Details

  • CWE ID: CWE-89
  • Attack Vector: Network
  • CVSS v3.1: 9.1
  • EPSS Score: 0.00002
  • Impact: Database Compromise / Data Exfiltration
  • Exploit Status: Public PoC Available
  • KEV Status: Not Listed

Affected Systems

  • LibreNMS <= 25.12.0
  • LibreNMS: <= 25.12.0 (Fixed in: 26.2.0)

Mitigation

  • Upgrade LibreNMS to version 26.2.0 or later.
  • Restrict access to the LibreNMS web interface to trusted internal IP addresses or VPN subnets.
  • Implement WAF rules to detect and block SQL injection attempts targeting the ajax_table.php endpoint.

Remediation Steps:

  1. Log into the LibreNMS application server.
  2. Run the daily.sh update script: ./daily.sh to fetch the latest application updates.
  3. Verify the installed version is 26.2.0 or greater by checking the web interface or running ./validate.php.
  4. Review access logs for POST requests to ajax_table.php containing suspicious SQL syntax in the 'address' parameter to identify potential historical compromises.

References


Generated by CVEReports - Automated Vulnerability Intelligence

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment