Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. librenms/librenms
  4. ›
  5. CVE-2025-65093

CVE-2025-65093: LibreNMS is vulnerable to SQL Injection (Boolean-Based Blind) in hostname parameter in ajax_output.php endpoint

November 18, 2025 (updated December 5, 2025)

A Boolean-Based Blind SQL Injection vulnerability was identified in the LibreNMS application at the /ajax_output.php endpoint. The hostname parameter is interpolated directly into an SQL query without proper sanitization or parameter binding, allowing an attacker to manipulate the query logic and infer data from the database through conditional responses.


References

  • github.com/advisories/GHSA-6pmj-xjxp-p8g9
  • github.com/librenms/librenms
  • github.com/librenms/librenms/security/advisories/GHSA-6pmj-xjxp-p8g9
  • nvd.nist.gov/vuln/detail/CVE-2025-65093

Code Behaviors & Features

Detect and mitigate CVE-2025-65093 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 25.11.0

Fixed versions

  • 25.11.0

Solution

Upgrade to version 25.11.0 or above.

Impact 5.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

packagist/librenms/librenms/CVE-2025-65093.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sun, 07 Dec 2025 00:21:01 +0000.