Browse all 49 CVE security advisories affecting Cacti. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Cacti is an open-source network monitoring and graphing tool primarily used by system administrators to visualize network traffic, device performance, and system metrics through RRDtool integration. Despite its widespread deployment in enterprise environments, the software has historically suffered from numerous security flaws, currently totaling 49 recorded CVEs. These vulnerabilities predominantly involve remote code execution, cross-site scripting, and privilege escalation, often stemming from insufficient input validation in PHP scripts and weak authentication mechanisms. Notable incidents include arbitrary file inclusion attacks that allowed attackers to execute malicious code on the server. The application’s reliance on older PHP frameworks and complex configuration files has frequently introduced injection points. While essential for infrastructure visibility, Cacti requires rigorous patching and strict access controls to mitigate risks associated with its extensive attack surface and legacy codebase.
This page lists every published CVE security advisory associated with Cacti. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.