{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-26989","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-02-17T01:41:24.606Z","datePublished":"2026-02-20T01:25:31.936Z","dateUpdated":"2026-02-20T15:34:55.873Z"},"containers":{"cna":{"title":"LibreNMS has Stored XSS in Alert Rule","problemTypes":[{"descriptions":[{"cweId":"CWE-79","lang":"en","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L","version":"3.1"}}],"references":[{"name":"https://github.com/librenms/librenms/security/advisories/GHSA-6xmx-xr9p-58p7","tags":["x_refsource_CONFIRM"],"url":"https://github.com/librenms/librenms/security/advisories/GHSA-6xmx-xr9p-58p7"},{"name":"https://github.com/librenms/librenms/pull/19039","tags":["x_refsource_MISC"],"url":"https://github.com/librenms/librenms/pull/19039"},{"name":"https://github.com/librenms/librenms/commit/087608cf9f851189847cb8e8e5ad002e59170c58","tags":["x_refsource_MISC"],"url":"https://github.com/librenms/librenms/commit/087608cf9f851189847cb8e8e5ad002e59170c58"},{"name":"https://github.com/librenms/librenms/releases/tag/26.2.0","tags":["x_refsource_MISC"],"url":"https://github.com/librenms/librenms/releases/tag/26.2.0"}],"affected":[{"vendor":"librenms","product":"librenms","versions":[{"version":"< 26.2.0","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-20T01:25:31.936Z"},"descriptions":[{"lang":"en","value":"LibreNMS is an auto-discovering PHP/MySQL/SNMP based network monitoring tool. Versions 25.12.0 and below are affected by a Stored Cross-Site Scripting (XSS) vulnerability in the Alert Rules workflow. An attacker with administrative privileges can inject malicious scripts that execute in the browser context of any user who accesses the Alert Rules page. This issue has been fixed in version 26.2.0."}],"source":{"advisory":"GHSA-6xmx-xr9p-58p7","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-20T15:26:36.141583Z","id":"CVE-2026-26989","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-20T15:34:55.873Z"}}]}}