DEBIAN-CVE-2025-66399

Source
https://security-tracker.debian.org/tracker/CVE-2025-66399
Import Source
https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66399.json
JSON Data
https://api.osv.dev/v1/vulns/DEBIAN-CVE-2025-66399
Upstream
Published
2025-12-02T18:15:49.540Z
Modified
2025-12-06T11:16:42.851509Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Cacti is an open source performance and fault management framework. Prior to 1.2.29, there is an input-validation flaw in the SNMP device configuration functionality. An authenticated Cacti user can supply crafted SNMP community strings containing control characters (including newlines) that are accepted, stored verbatim in the database, and later embedded into backend SNMP operations. In environments where downstream SNMP tooling or wrappers interpret newline-separated tokens as command boundaries, this can lead to unintended command execution with the privileges of the Cacti process. This vulnerability is fixed in 1.2.29.

References

Affected packages

Debian:11 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.16+ds1-2
1.2.16+ds1-2+deb11u1
1.2.16+ds1-2+deb11u2
1.2.16+ds1-2+deb11u3
1.2.16+ds1-2+deb11u4
1.2.16+ds1-2+deb11u5
1.2.19+ds1-1
1.2.19+ds1-2
1.2.20+ds1-1
1.2.20+ds1-2
1.2.21+ds1-1
1.2.22+ds1-1
1.2.22+ds1-2
1.2.22+ds1-3
1.2.23+ds1-1
1.2.23+ds1-2
1.2.24+ds1-1
1.2.25+ds1-1
1.2.25+ds1-2
1.2.26+ds1-1
1.2.27+ds1-1
1.2.27+ds1-2
1.2.28+ds1-1
1.2.28+ds1-2
1.2.28+ds1-3
1.2.28+ds1-4
1.2.30+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66399.json"

Debian:12 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.24+ds1-1
1.2.24+ds1-1+deb12u1
1.2.24+ds1-1+deb12u2
1.2.24+ds1-1+deb12u3
1.2.24+ds1-1+deb12u4
1.2.24+ds1-1+deb12u5
1.2.25+ds1-1
1.2.25+ds1-2
1.2.26+ds1-1
1.2.27+ds1-1
1.2.27+ds1-2
1.2.28+ds1-1
1.2.28+ds1-2
1.2.28+ds1-3
1.2.28+ds1-4
1.2.30+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66399.json"

Debian:13 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.30+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66399.json"

Debian:14 / cacti

Package

Name
cacti
Purl
pkg:deb/debian/cacti?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.30+ds1-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Database specific

source

"https://storage.googleapis.com/debian-osv/debian-cve-osv/DEBIAN-CVE-2025-66399.json"