{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:22:20.233","vulnerabilities":[{"cve":{"id":"CVE-2024-47524","sourceIdentifier":"security-advisories@github.com","published":"2024-10-01T21:15:07.297","lastModified":"2024-12-19T15:43:50.877","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LibreNMS is an open-source, PHP/MySQL/SNMP-based network monitoring system. User with Admin role can create a Device Groups, the application did not properly sanitize the user input in the Device Groups name, when user see the detail of the Device Group, if java script code is inside the name of the Device Groups, its will be trigger. This vulnerability is fixed in 24.9.0."},{"lang":"es","value":"LibreNMS es un sistema de monitoreo de red de código abierto basado en PHP/MySQL/SNMP. El usuario con rol de administrador puede crear un grupo de dispositivos, pero la aplicación no desinfectó correctamente la entrada del usuario en el nombre del grupo de dispositivos. Cuando el usuario ve los detalles del grupo de dispositivos, si el código de Java script está dentro del nombre del grupo de dispositivos, se activará. Esta vulnerabilidad se solucionó en la versión 24.9.0."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*","versionEndExcluding":"24.9.0","matchCriteriaId":"E39B6DE8-DAD4-4158-B2BF-93B804AE09FF"}]}]}],"references":[{"url":"https://github.com/librenms/librenms/commit/d3b51560a8e2343e520d16e9adc72c6951aa91ee","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/librenms/librenms/security/advisories/GHSA-fc38-2254-48g7","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}