Dom XSS in module "Search IPv6" in librenms/librenms


Reported on

Sep 15th 2023


1 .Access to IPv6 search function

2 .Enter the payload in the IPv4 field to perform the search

Payload :


3 .Enter the search button and the payload will be executed

Proof of Concept

Link video Poc :


XSS can cause a variety of problems for the end user that range in severity from an annoyance to complete account compromise. The most severe XSS attacks involve disclosure of the user's session cookie, allowing an attacker to hijack the user's session and take over the account.can execute client side scrips etc

We are processing your report and will contact the librenms team within 24 hours. 3 months ago
A GitHub Issue asking the maintainers to create a exists 3 months ago
Tony Murray
3 months ago


You forgot to update your comment to IPv6 in your copy-pasta. Also, your Occurrences is bogus and not appreciated.

Tony Murray validated this vulnerability 3 months ago
Trunggg02 has been awarded the disclosure bounty
The fix bounty is now up for grabs
The researcher's credibility has increased: +7
3 months ago


@Tony Murray Your IPv6 search function is currently not processing input. Maybe in the report I mistakenly wrote it as IPv4

3 months ago


@Maintainer Can you please specify a CVE for this vulnerability ?

3 months ago



Tony Murray marked this as fixed in 23.9.1 with commit 8fd8d9 3 months ago
The fix bounty has been dropped
This vulnerability has been assigned a CVE
Tony Murray published this vulnerability 3 months ago
3 months ago

This has been listed as a vulnerability with user interaction required, although its a post request. Without creating another web application to create the post request how do you actually expect this to work? and even at that, what would be the outcome?

to join this conversation