{"id":"CVE-2025-45160","details":"A HTML injection vulnerability exists in the file upload functionality of Cacti \u003c= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., \u003ch1\u003e, \u003cb\u003e, \u003csvg\u003e) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.","modified":"2026-04-10T05:27:02.243713Z","published":"2026-01-29T18:16:07.693Z","references":[{"type":"WEB","url":"https://gist.github.com/BEND0US/49d76897a5bb676d8c3f51425553cc32"},{"type":"PACKAGE","url":"https://github.com/Cacti/cacti"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-45160.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"}]}