banner logoJoin us at RSAC™ 2026 Conference, March 23–March 26 | North Expo, Booth N-5863Join us at RSAC™ 2026, March 23–March 26Learn More
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI Security Portfolio
      Leading the Way in AI-Powered Security Solutions
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-26990

CVE-2026-26990: LibreNMS Time-Based Blind SQLi Vulnerability

CVE-2026-26990 is a time-based blind SQL injection flaw in LibreNMS affecting versions 25.12.0 and below. Authenticated attackers can exploit the address parameter to extract database information. This post covers technical details, affected versions, impact, and mitigation strategies.

Published: February 27, 2026

CVE-2026-26990 Overview

LibreNMS, an auto-discovering PHP/MySQL/SNMP based network monitoring tool, contains a Time-Based Blind SQL Injection vulnerability in address-search.inc.php. Versions 25.12.0 and below are affected by this flaw, which allows authenticated attackers to manipulate SQL query logic and extract sensitive database information through time-based conditional responses. The vulnerability exists because a crafted subnet prefix value supplied via the address parameter is concatenated directly into an SQL query without proper parameter binding.

Critical Impact

Authenticated users can exploit this SQL injection vulnerability to infer and extract sensitive database information, potentially compromising the confidentiality, integrity, and availability of the entire LibreNMS monitoring infrastructure.

Affected Products

  • LibreNMS versions 25.12.0 and below
  • LibreNMS installations with address search functionality enabled
  • All LibreNMS deployments prior to version 26.2.0

Discovery Timeline

  • 2026-02-20 - CVE CVE-2026-26990 published to NVD
  • 2026-02-20 - Last updated in NVD database

Technical Details for CVE-2026-26990

Vulnerability Analysis

This Time-Based Blind SQL Injection vulnerability (CWE-89) exists in the address search functionality of LibreNMS. The root issue stems from improper handling of user-supplied input in the address-search.inc.php file. When an authenticated user submits a search query with a specially crafted subnet prefix, the application fails to properly sanitize or parameterize this input before incorporating it into a database query.

The vulnerability is classified as authenticated, meaning an attacker must possess valid credentials to exploit it. However, any authenticated user—regardless of privilege level—can leverage this flaw to extract sensitive information from the backend MySQL database through time-based inference attacks.

Root Cause

The vulnerability originates from direct string concatenation of user-supplied input into SQL queries without proper parameter binding. The address parameter in the address search functionality accepts subnet prefix values that are then unsafely incorporated into database queries. This violates secure coding practices that mandate the use of prepared statements or parameterized queries for all user-controlled data.

Attack Vector

The attack is network-accessible and exploitable with low complexity. An authenticated attacker can submit malicious payloads through the address search feature, injecting SQL syntax that includes time-delay functions such as SLEEP() or BENCHMARK(). By measuring response times, the attacker can systematically infer database contents character by character, extracting usernames, password hashes, configuration data, and other sensitive information stored in the LibreNMS database.

php
// Security patch excerpt from AddressSearchController.php
// Source: https://github.com/librenms/librenms/commit/15429580baba03ed1dd377bada1bde4b7a1175a1

+<?php
+
+/**
+ * SearchController.php
+ *
+ * -Description-
+ *
+ * This program is free software: you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation, either version 3 of the License, or
+ * (at your option) any later version.
+ *
+ * This program is distributed in the hope that it will be useful,
+ * but WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.See the
+ * GNU General Public License for more details.
+ *
+ * You should have received a copy of the GNU General Public License
+ * along with this program.  If not, see <https://www.gnu.org/licenses/>.
+ *
+ * @link       https://www.librenms.org
+ *
+ * @copyright  2026 Tony Murray
+ * @author     Tony Murray <murraytony@gmail.com>
+ */
+
+namespace App\Http\Controllers\Table;
+
+use App\Models\Port;
+use Illuminate\Contracts\Database\Query\Expression;

The fix involves a complete rewrite of the address search backend to use Laravel's Eloquent ORM with proper parameter binding, eliminating the direct SQL string concatenation vulnerability.

Detection Methods for CVE-2026-26990

Indicators of Compromise

  • Anomalous response times on address search API endpoints indicating time-based SQL injection attempts
  • Database logs showing unusual query patterns with SLEEP(), BENCHMARK(), or WAITFOR functions
  • Multiple sequential requests to address search functionality from a single authenticated session
  • Web application logs containing SQL syntax characters in address search parameters (e.g., ', --, ;, OR, AND)
  • Unexpected database load or timeout errors correlated with address search requests

Detection Strategies

  • Implement Web Application Firewall (WAF) rules to detect SQL injection patterns in HTTP requests
  • Monitor database query logs for queries containing time-delay functions or unusual conditional statements
  • Configure alerting on abnormal response time distributions for the address search endpoint
  • Deploy SentinelOne Singularity XDR to detect anomalous application behavior and potential SQL injection exploitation attempts
  • Audit authentication logs for accounts performing excessive address search queries

Monitoring Recommendations

  • Enable detailed logging for the LibreNMS address search functionality
  • Configure real-time alerting for SQL injection signature matches in web server logs
  • Monitor database performance metrics for unusual CPU spikes or query execution delays
  • Implement user behavior analytics to identify authenticated users exhibiting suspicious search patterns

How to Mitigate CVE-2026-26990

Immediate Actions Required

  • Upgrade LibreNMS to version 26.2.0 or later immediately
  • Review authentication logs to identify potential exploitation attempts
  • Audit user accounts with access to address search functionality for suspicious activity
  • Apply network segmentation to limit access to LibreNMS management interfaces
  • Consider temporarily disabling address search functionality if immediate patching is not possible

Patch Information

The vulnerability has been addressed in LibreNMS version 26.2.0. The fix involves a complete rewrite of the address search backend using Laravel's Eloquent ORM with proper parameter binding. The security patch is available via the GitHub Commit Fix. Additional details are available in the GitHub Security Advisory GHSA-79q9-wc6p-cf92 and the GitHub Pull Request #18777.

Workarounds

  • Restrict network access to LibreNMS to trusted IP addresses only
  • Implement additional authentication controls such as multi-factor authentication
  • Deploy a Web Application Firewall with SQL injection detection rules
  • Monitor and limit API rate access for authenticated users
bash
# Configuration example - Restrict access to LibreNMS via nginx
# Add to your nginx server block configuration

location /ajax/table/address-search {
    # Temporarily disable address search or restrict to admin IPs
    allow 10.0.0.0/8;
    deny all;
    
    # Or implement rate limiting
    limit_req zone=librenms_api burst=5 nodelay;
}

# Define rate limiting zone in http block
# limit_req_zone $binary_remote_addr zone=librenms_api:10m rate=10r/m;

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeSQLI

  • Vendor/TechLibrenms

  • SeverityHIGH

  • CVSS Score8.8

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-89
  • Technical References
  • GitHub Pull Request Update

  • GitHub Security Advisory GHSA-79q9-wc6p-cf92
  • Vendor Resources
  • GitHub Commit Fix
  • Related CVEs
  • CVE-2026-26988: LibreNMS SQL Injection Vulnerability

  • CVE-2020-36947: LibreNMS SQL Injection Vulnerability

  • CVE-2026-26987: LibreNMS Reflected XSS Vulnerability

  • CVE-2026-26989: LibreNMS Stored XSS Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • English
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use