{
  "affected": [
    {}
  ],
  "details": "A HTML injection vulnerability exists in the file upload functionality of Cacti \u003c= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., \u003ch1\u003e, \u003cb\u003e, \u003csvg\u003e) into the rendered page. NOTE: Multiple third-parties including the maintainer have stated that they cannot reproduce this issue after 1.2.27.",
  "id": "CVE-2025-45160",
  "modified": "2026-03-10T21:53:41.172188248Z",
  "published": "2026-01-29T18:16:07.693Z",
  "references": [
    {
      "type": "WEB",
      "url": "https://gist.github.com/BEND0US/49d76897a5bb676d8c3f51425553cc32"
    },
    {
      "type": "PACKAGE",
      "url": "https://github.com/Cacti/cacti"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
      "type": "CVSS_V3"
    }
  ]
}