CVE-2026-26990

8.8 HIGH

📋 TL;DR

LibreNMS versions 25.12.0 and below contain a time-based blind SQL injection vulnerability in the address-search functionality. Authenticated attackers can exploit this to infer database information by manipulating query logic through crafted subnet prefixes. This affects any LibreNMS installation with authenticated users.

💻 Affected Systems

Products:
  • LibreNMS
Versions: 25.12.0 and below
Operating Systems: All platforms running LibreNMS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access; all default configurations are vulnerable if running affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including sensitive configuration data, user credentials, and network monitoring information leading to lateral movement within the network.

🟠

Likely Case

Data exfiltration of network monitoring information, configuration details, and potentially user credentials from the database.

🟢

If Mitigated

Limited impact due to proper network segmentation, minimal user privileges, and database access controls preventing sensitive data exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authentication but any authenticated user can exploit; time-based blind SQL injection requires more sophisticated exploitation than standard SQLi.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 26.2.0

Vendor Advisory: https://github.com/librenms/librenms/security/advisories/GHSA-79q9-wc6p-cf92

Restart Required: No

Instructions:

1. Backup your LibreNMS installation and database. 2. Update LibreNMS to version 26.2.0 or later using git: 'git pull origin master'. 3. Run database updates: './daily.sh'. 4. Verify the fix by checking the version.

🔧 Temporary Workarounds

Restrict User Access

all

Limit authenticated user access to only trusted administrators until patching can be completed.

Input Validation Filter

all

Implement web application firewall rules or input validation to block SQL injection patterns in the address parameter.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate LibreNMS from sensitive systems
  • Enable detailed logging and monitoring for SQL injection attempts in application logs

🔍 How to Verify

Check if Vulnerable:

Check LibreNMS version: 'grep 'version' /opt/librenms/includes/vars.php' or via web interface. If version is 25.12.0 or below, system is vulnerable.

Check Version:

grep "\$config['version']" /opt/librenms/includes/vars.php

Verify Fix Applied:

Verify version is 26.2.0 or later and check that the address-search.inc.php file includes proper parameter binding (refer to commit 15429580baba03ed1dd377bada1bde4b7a1175a1).

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple requests with varying address parameters causing delayed responses
  • Patterns of SQL injection attempts in web server logs

Network Indicators:

  • Unusual database connection patterns from LibreNMS application server
  • Time-delayed responses to address search requests

SIEM Query:

source="librenms_logs" AND (address_search OR address_parameter) AND (sql OR injection OR sleep OR benchmark)

🔗 References

📤 Share & Export