Cacti Security Cactus: Prickly Remote Code Flaw Uncovered!
Cacti’s got a prickly problem! A critical remote code execution bug (CVE-2025-22604) lets authenticated users inject malicious code. It’s like giving a cactus legs and letting it run wild in your data garden. Time to patch up before your sensitive info becomes a piñata at the hacker fiesta!

Hot Take:
Looks like Cacti’s open-source network monitoring framework is branching out – into the world of unintended remote code execution! Who knew a little SNMP could cause so much RCE drama? If their software were a cactus, you’d better watch out for those prickly vulnerabilities!
Key Points:
- Cacti framework has a critical remote code execution flaw, CVE-2025-22604, with a CVSS score of 9.1.
- The vulnerability involves the multi-line SNMP result parser and allows authenticated users to inject malformed OIDs.
- This flaw impacts all versions of Cacti before 1.2.29.
- Another vulnerability, CVE-2025-24367, allows arbitrary PHP script creation, leading to remote code execution.
- Both vulnerabilities require the attacker to be authenticated in the system to exploit.
Already a member? Log in here