Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
9.3
LibreNMS: Unapproved data can access database records
CVE-2026-26988
GHSA-h3rv-q4rq-pqcv
Summary
A security issue exists in LibreNMS's IPv6 address search feature. If not addressed, an attacker could potentially access unauthorized data or manipulate the database. To protect your data, update LibreNMS to the latest version or apply a patch to the vulnerable code.
What to do
No fix is available yet. Check with your software vendor for updates.
Affected software
| Vendor | Product | Affected versions | Fix available |
|---|---|---|---|
| librenms | librenms | <= 26.2.0 | – |
Original title
LibreNMS: SQL Injection in ajax_table.php spreads through a covert data stream.
Original description
### Summary
*SQL Injection in IPv6 Address Search functionality via `address` parameter**
A SQL injection vulnerability exists in the `ajax_table.php` endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the `address` parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation.
### Details
The vulnerability is located in the logic that handles address searching when `search_type` is set to `ipv6`.
The application takes the user-supplied `address` parameter and splits it using the `/` delimiter:
```PHP
[$address, $prefix] = explode('/', $vars['address']);
```
If the search_type is ipv6 and the $prefix variable is not empty, the code constructs the SQL query by directly concatenating the $prefix variable into the string:
```
} elseif ($vars['search_type'] == 'ipv6') {
// ... code omitted ...
if (! empty($prefix)) {
// VULNERABILITY: Direct concatenation of user input
$sql .= " AND ipv6_prefixlen = '$prefix'";
}
}
```
Unlike the ipv4 block, which attempts to use prepared statements (binding parameters via $param[]), the ipv6 block treats the prefix as a raw string. By supplying an input containing a /, an attacker can populate the $prefix variable. If this variable contains single quotes ('), it breaks out of the string literal in the SQL statement, enabling SQL injection.
Vulnerable Code Snippet:
```
if (! empty($prefix)) {
$sql .= " AND ipv6_prefixlen = '$prefix'";
}
```
### PoC
To reproduce this vulnerability, an attacker can send a specially crafted HTTP POST request to the ajax_table.php endpoint.
Payload breakdown:
- search_type=ipv6: Forces the execution flow into the vulnerable elseif block.
- address=snow/1nd'":
- The explode function splits this into $address = 'snow' and $prefix = "1nd'"".
- The SQL query becomes: ... AND ipv6_prefixlen = '1nd'"'.
- The single quote ' closes the string definition in the SQL query, and the subsequent characters allow for SQL syntax manipulation.
Reproduction Steps:
1. Access the application instance.
2. Send the following request (adjusting the host as necessary):
```
POST /ajax_table.php HTTP/1.1
Host: localhost
id=address-search&search_type=ipv6&address=snow/1nd'"
```
### Impact
This vulnerability allows an attacker to execute arbitrary SQL queries against the database.
*SQL Injection in IPv6 Address Search functionality via `address` parameter**
A SQL injection vulnerability exists in the `ajax_table.php` endpoint. The application fails to properly sanitize or parameterize user input when processing IPv6 address searches. Specifically, the `address` parameter is split into an address and a prefix, and the prefix portion is directly concatenated into the SQL query string without validation. This allows an attacker to inject arbitrary SQL commands, potentially leading to unauthorized data access or database manipulation.
### Details
The vulnerability is located in the logic that handles address searching when `search_type` is set to `ipv6`.
The application takes the user-supplied `address` parameter and splits it using the `/` delimiter:
```PHP
[$address, $prefix] = explode('/', $vars['address']);
```
If the search_type is ipv6 and the $prefix variable is not empty, the code constructs the SQL query by directly concatenating the $prefix variable into the string:
```
} elseif ($vars['search_type'] == 'ipv6') {
// ... code omitted ...
if (! empty($prefix)) {
// VULNERABILITY: Direct concatenation of user input
$sql .= " AND ipv6_prefixlen = '$prefix'";
}
}
```
Unlike the ipv4 block, which attempts to use prepared statements (binding parameters via $param[]), the ipv6 block treats the prefix as a raw string. By supplying an input containing a /, an attacker can populate the $prefix variable. If this variable contains single quotes ('), it breaks out of the string literal in the SQL statement, enabling SQL injection.
Vulnerable Code Snippet:
```
if (! empty($prefix)) {
$sql .= " AND ipv6_prefixlen = '$prefix'";
}
```
### PoC
To reproduce this vulnerability, an attacker can send a specially crafted HTTP POST request to the ajax_table.php endpoint.
Payload breakdown:
- search_type=ipv6: Forces the execution flow into the vulnerable elseif block.
- address=snow/1nd'":
- The explode function splits this into $address = 'snow' and $prefix = "1nd'"".
- The SQL query becomes: ... AND ipv6_prefixlen = '1nd'"'.
- The single quote ' closes the string definition in the SQL query, and the subsequent characters allow for SQL syntax manipulation.
Reproduction Steps:
1. Access the application instance.
2. Send the following request (adjusting the host as necessary):
```
POST /ajax_table.php HTTP/1.1
Host: localhost
id=address-search&search_type=ipv6&address=snow/1nd'"
```
### Impact
This vulnerability allows an attacker to execute arbitrary SQL queries against the database.
nvd CVSS3.1
9.1
nvd CVSS4.0
9.3
Vulnerability type
CWE-89
SQL Injection
- https://github.com/librenms/librenms/pull/18777 Issue Tracking
- https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a11... Patch
- https://github.com/librenms/librenms/security/advisories/GHSA-h3rv-q4rq-pqcv Exploit Third Party Advisory
- https://github.com/advisories/GHSA-h3rv-q4rq-pqcv
Published: 18 Feb 2026 · Updated: 11 Mar 2026 · First seen: 6 Mar 2026