A HTML injection vulnerability exists in the file upload functionality of Cacti <= 1.2.29. When a file with an invalid format is uploaded, the application reflects the submitted filename back into an error popup without proper sanitization. As a result, attackers can inject arbitrary HTML elements (e.g., <h1>, <b>, <svg>) into the rendered page.
- Login to the application.
- Navigate to the file upload interface.
- Upload a file with invalid content (File content may be empty) and provide the following file name:
<h1>HACK.xml - Upon submission, the application displays a popup error including the unsanitized filename.
- The
<h1>tag is rendered in the popup, altering the layout and potentially misleading the user.
While this does not allow JavaScript execution (i.e., no XSS), it constitutes an HTML Injection vulnerability that could be used to alter the DOM, perform UI redressing, or launch social engineering attacks.
- Authenticated Template File Upload Endpoint - Error Handling
POST /templates_import.php?preview_only=true
filename
- HTML Injection
- Cacti
- Versions:
<= 1.2.29 - Vendor: https://github.com/Cacti/cacti
- Dogus Demirkiran




Hello Dogus,
Based on our tests and Cacti tests, this CVE does not impact 1.2.29 or higher.
Cacti answered this does not affect anything beyond 1.2.27 after they introduced the DomPurify.
Can you please recheck on your side with a clean install of Cacti ?
Thanks
Wil - CERT Orange Cyberdefense