{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-07T10:46:11.695","vulnerabilities":[{"cve":{"id":"CVE-2026-26988","sourceIdentifier":"security-advisories@github.com","published":"2026-02-20T02:16:54.550","lastModified":"2026-02-20T16:31:42.897","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below contain an SQL Injection vulnerability in the ajax_table.php endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the address parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation. This issue has been fixed in version 26.2.0."},{"lang":"es","value":"LibreNMS es una herramienta de monitoreo de red basada en PHP/MySQL/SNMP con descubrimiento automático. Las versiones 25.12.0 e inferiores contienen una vulnerabilidad de inyección SQL en el endpoint ajax_table.php. La aplicación no logra sanitizar o parametrizar correctamente la entrada del usuario al procesar búsquedas de direcciones IPv6. Específicamente, el parámetro 'address' se divide en una 'dirección' y un 'prefijo', y la porción del prefijo se concatena directamente en la cadena de consulta SQL sin validación. Esto permite a un atacante inyectar comandos SQL arbitrarios, lo que podría llevar a un acceso no autorizado a los datos o a la manipulación de la base de datos. Este problema ha sido corregido en la versión 26.2.0."}],"metrics":{"cvssMetricV40":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":9.3,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:librenms:librenms:*:*:*:*:*:*:*:*","versionEndExcluding":"26.2.0","matchCriteriaId":"C0838E1C-0369-4B31-9B51-83A5D2A7CAC9"}]}]}],"references":[{"url":"https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/librenms/librenms/pull/18777","source":"security-advisories@github.com","tags":["Issue Tracking"]},{"url":"https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcv","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]}]}}]}