CVE-2022-4068: Cross-site Scripting in librenms/librenms
7.6
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.97303%
CWE
Published
11/20/2022
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| librenms/librenms | composer | < 22.10.0 | 22.10.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key issues: 1) Mass assignment via $request->all() in UserController@update allowed unrestricted field modification. 2) Inadequate role-based validation in UpdateUserRequest@rules permitted non-admins to submit privileged fields. Together, these enabled users to reactivate disabled accounts and potentially inject XSS payloads via unsanitized username fields (though the exact XSS rendering point isn't visible in the provided diff). The commit fixes both by using validated() and implementing admin-specific validation rules.