CVE-2005-10004
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
30/08/2025
Last modified:
26/12/2025
Description
Cacti versions prior to 0.8.6-d contain a remote command execution vulnerability in the graph_view.php script. An authenticated user can inject arbitrary shell commands via the graph_start GET parameter, which is improperly handled during graph rendering. This flaw allows attackers to execute commands on the underlying operating system with the privileges of the web server process, potentially compromising system integrity.
Impact
Base Score 4.0
8.70
Severity 4.0
HIGH
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cacti:cacti:*:*:*:*:*:*:*:* | 0.8.6d (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/cacti_graphimage_exec.rb
- https://web.archive.org/web/20050305034552/http://www.cacti.net/cactid_download.php
- https://www.cacti.net/info/downloads
- https://www.exploit-db.com/exploits/16881
- https://www.exploit-db.com/exploits/9911
- https://www.vulncheck.com/advisories/cacti-graph-view-rce



