The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2024-25641

CVE-2024-25641: Cacti Package Import RCE Vulnerability

CVE-2024-25641 is a remote code execution vulnerability in Cacti's Package Import feature that allows authenticated users to execute arbitrary PHP code. This article covers technical details, affected versions, and mitigation.

Published: January 28, 2026

CVE-2024-25641 Overview

CVE-2024-25641 is an arbitrary file write vulnerability affecting Cacti, a popular open-source operational monitoring and fault management framework. The vulnerability exists in the "Package Import" feature and allows authenticated users with the "Import Templates" permission to write arbitrary files to the web server, ultimately enabling remote code execution through malicious PHP file uploads.

The flaw resides within the import_package() function in /lib/import.php, which fails to properly validate filename and file content provided within XML data during the package import process. This allows attackers to write or overwrite arbitrary files on the web server, including executable PHP scripts.

Critical Impact

Authenticated attackers can achieve remote code execution by exploiting the arbitrary file write vulnerability in Cacti's Package Import feature, potentially leading to complete server compromise.

Affected Products

  • Cacti versions prior to 1.2.27
  • Fedora 39 (affected through Cacti package)

Discovery Timeline

  • 2024-05-14 - CVE-2024-25641 published to NVD
  • 2025-11-04 - Last updated in NVD database

Technical Details for CVE-2024-25641

Vulnerability Analysis

This vulnerability represents a critical security flaw in Cacti's package import functionality. The import_package() function in /lib/import.php processes XML data containing filenames and file content without proper validation. The function blindly trusts user-supplied data within the XML structure and writes files directly to the Cacti installation directory.

The vulnerability is particularly severe because path traversal sequences are not filtered from the filename parameter, allowing attackers to write files outside the intended directory structure. Combined with the ability to control file content, this enables an attacker to place malicious PHP scripts anywhere on the web server's filesystem where the web server process has write permissions.

Root Cause

The root cause of CVE-2024-25641 is improper input validation in the import_package() function. The function accepts XML data during package imports but does not sanitize or validate the filename paths or file content before writing to disk. Specifically:

  • No validation of filename characters or path components
  • No filtering of path traversal sequences (e.g., ../)
  • No content type or file extension restrictions
  • Blind trust in user-controlled XML data structure

This allows malicious actors to craft XML payloads containing arbitrary filenames with path traversal sequences and malicious PHP code as file content.

Attack Vector

The attack requires authenticated access to Cacti with "Import Templates" permissions. An attacker can exploit this vulnerability by:

  1. Crafting a malicious XML package containing a PHP web shell or other malicious code
  2. Including path traversal sequences in the filename to target specific locations
  3. Importing the package through the Package Import feature
  4. Accessing the written PHP file through the web server to execute arbitrary commands

The vulnerability is exploitable remotely over the network and requires no user interaction beyond the initial authentication. The attacker's crafted XML payload would include a filename with path traversal sequences pointing to a web-accessible directory and PHP code designed to provide command execution capabilities.

For detailed technical information about the exploitation mechanism, refer to the GitHub Security Advisory GHSA-7cmj-g5qc-pj88 and the Full Disclosure posting.

Detection Methods for CVE-2024-25641

Indicators of Compromise

  • Unexpected PHP files appearing in the Cacti web root or other web-accessible directories
  • Suspicious files with unusual names or in unexpected locations within the Cacti installation
  • Web server logs showing POST requests to the Package Import functionality followed by requests to newly created PHP files
  • File system changes in Cacti directories that don't correspond to legitimate template imports

Detection Strategies

  • Monitor file integrity of the Cacti installation directory using tools like AIDE or Tripwire to detect unauthorized file creation or modification
  • Implement web application firewall (WAF) rules to inspect XML payloads for path traversal sequences
  • Review Cacti audit logs for template import operations performed by users with elevated permissions
  • Deploy endpoint detection to identify web shells or suspicious PHP file execution patterns

Monitoring Recommendations

  • Enable verbose logging for all Package Import operations in Cacti
  • Configure alerts for file creation events within the web server document root
  • Monitor for outbound connections from the web server that may indicate web shell activity
  • Track user accounts with "Import Templates" permission and audit their activities regularly

How to Mitigate CVE-2024-25641

Immediate Actions Required

  • Upgrade Cacti to version 1.2.27 or later immediately
  • Review and restrict the "Import Templates" permission to only trusted administrators
  • Audit existing user accounts and remove unnecessary elevated permissions
  • Scan the Cacti installation for any unauthorized or suspicious PHP files

Patch Information

Cacti version 1.2.27 addresses this vulnerability by implementing proper input validation in the import_package() function. The fix includes validation of filenames to prevent path traversal attacks and proper sanitization of file content.

The security patch is available through the official Cacti GitHub repository. Linux distribution users should apply updates through their respective package managers:

  • Fedora users: Apply the update referenced in the Fedora Package Announcement
  • Debian users: Refer to the Debian LTS Announcement for patched package versions

Workarounds

  • Disable the Package Import feature entirely if not required for operations
  • Implement strict file system permissions to prevent the web server from writing to directories outside the intended upload locations
  • Deploy a web application firewall (WAF) to filter requests containing path traversal patterns
  • Consider network segmentation to isolate Cacti instances from critical infrastructure
bash
# Restrict write permissions on Cacti directories
chmod -R 755 /var/www/html/cacti/
chown -R root:www-data /var/www/html/cacti/

# Set specific directories writable only where necessary
chmod 775 /var/www/html/cacti/cache/
chmod 775 /var/www/html/cacti/resource/

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechCacti

  • SeverityHIGH

  • CVSS Score7.2

  • EPSS Probability88.58%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-20

  • NVD-CWE-noinfo
  • Technical References
  • Full Disclosure Mailing List

  • Fedora Package Announcement

  • Debian LTS Announcement
  • Vendor Resources
  • Cacti GitHub Commit Update

  • GitHub Security Advisory GHSA-7cmj-g5qc-pj88
  • Related CVEs
  • CVE-2025-24367: Cacti Graph Template RCE Vulnerability

  • CVE-2025-22604: Cacti SNMP Parser RCE Vulnerability

  • CVE-2022-46169: Cacti RCE Vulnerability

  • CVE-2024-29895: Cacti Command Injection RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English