Prtg Network Monitor Paessler Prtg Network Monitor

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Paessler Prtg Network Monitor.

By the Year

In 2026 there have been 3 vulnerabilities in Paessler Prtg Network Monitor with an average score of 6.0 out of ten. Last year, in 2025 Prtg Network Monitor had 1 security vulnerability published. That is, 2 more vulnerabilities have already been reported in 2026 as compared to last year. Last year, the average CVE base score was greater by 0.10




Year Vulnerabilities Average Score
2026 3 6.00
2025 1 6.10
2024 1 6.10
2023 6 6.22
2022 1 5.30
2021 3 5.00
2020 6 7.40
2019 3 0.00
2018 6 8.42

It may take a day or so for new Prtg Network Monitor vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Paessler Prtg Network Monitor Security Vulnerabilities

PRTG Network Monitor XSS via tag param before 25.4.114
CVE-2025-67833 6.1 - Medium - January 14, 2026

Paessler PRTG Network Monitor before 25.4.114 allows XSS by an unauthenticated attacker via the tag parameter.

XSS

PRTG Network Monitor <=25.4.113 XSS via filter parameter
CVE-2025-67834 5.4 - Medium - January 14, 2026

Paessler PRTG Network Monitor before 25.4.114 allows XSS by an unauthenticated attacker via the filter parameter.

XSS

PRTG Network Monitor <25.4.114 Authenticated DoS via Notification Contacts
CVE-2025-67835 6.5 - Medium - January 14, 2026

Paessler PRTG Network Monitor before 25.4.114 allows Denial-of-Service (DoS) by an authenticated attacker via the Notification Contacts functionality.

Resource Exhaustion

PRTG Network Monitor XSS Auth Bypass via Web Interface
CVE-2024-12833 6.1 - Medium - February 11, 2025

Paessler PRTG Network Monitor SNMP Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. Some user interaction on the part of an administrator is required to exploit this vulnerability. The specific flaw exists within the PRTG Network Monitor web interface. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-23371.

XSS

CVE-2023-51630 PRTG Monitor XSS Auth Bypass
CVE-2023-51630 6.1 - Medium - February 08, 2024

Paessler PRTG Network Monitor Cross-Site Scripting Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Paessler PRTG Network Monitor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the web console. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-21182.

XSS

Command Injection in PRTG Dicom Sensor <23.2.84.1566
CVE-2023-32782 7.2 - High - August 09, 2023

A command injection was identified in PRTG 23.2.84.1566 and earlier versions in the Dicom C-ECHO sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Command Injection

Path Traversal in PRTG HL7 Sensor before 23.2.84.1566
CVE-2023-31448 4.7 - Medium - August 09, 2023

A path traversal vulnerability was identified in the HL7 sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the HL7 sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Directory traversal

PRTG HL7 Sensor Command Injection before 23.2.84.1566
CVE-2023-32781 7.2 - High - August 09, 2023

A command injection vulnerability was identified in PRTG 23.2.84.1566 and earlier versions in the HL7 sensor where an authenticated user with write permissions could abuse the debug option to write new files that could potentially get executed by the EXE/Script sensor. The severity of this vulnerability is high and received a score of 7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Command Injection

PRTG CSRF token bypass pre-23.2.84.1566; remote privilege escalation
CVE-2023-31452 8.8 - High - August 09, 2023

A cross-site request forgery (CSRF) token bypass was identified in PRTG 23.2.84.1566 and earlier versions that allows remote attackers to perform actions with the permissions of a victim user, provided the victim user has an active session and is induced to trigger the malicious request. This could force PRTG to execute different actions, such as creating new users. The severity of this vulnerability is high and received a score of 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Session Riding

PRTG 23.2.84.1566 & <23.2.84.1566: Insecure Path Traversal in SQL v2 Sensors
CVE-2023-31450 4.7 - Medium - August 09, 2023

A path traversal vulnerability was identified in the SQL v2 sensors in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the SQL v2 sensors into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Directory traversal

PRTG WMI Custom Sensor Path Traversal v23.2.84.1566
CVE-2023-31449 4.7 - Medium - August 09, 2023

A path traversal vulnerability was identified in the WMI Custom sensor in PRTG 23.2.84.1566 and earlier versions where an authenticated user with write permissions could trick the WMI Custom sensor into behaving differently for existing files and non-existing files. This made it possible to traverse paths, allowing the sensor to execute files outside the designated custom sensors folder. The severity of this vulnerability is medium and received a score of 4.7 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L

Directory traversal

PRTG Network Monitor <22.2.77.2204 XSS via Device Icon CSS
CVE-2022-35739 5.3 - Medium - October 25, 2022

PRTG Network Monitor through 22.2.77.2204 does not prevent custom input for a devices icon, which can be modified to insert arbitrary content into the style tag for that device. When the device page loads, the arbitrary Cascading Style Sheets (CSS) data is inserted into the style tag, loading malicious content. Due to PRTG Network Monitor preventing characters, and from modern browsers disabling JavaScript support in style tags, this vulnerability could not be escalated into a Cross-Site Scripting vulnerability.

XSS

PRTG Network Monitor before 21.3.69.1333
CVE-2021-29643 5.4 - Medium - September 13, 2021

PRTG Network Monitor before 21.3.69.1333 allows stored XSS via an unsanitized string imported from a User Object in a connected Active Directory instance.

XSS

PRTG Network Monitor 20.1.55.1775
CVE-2021-34547 4.3 - Medium - June 10, 2021

PRTG Network Monitor 20.1.55.1775 allows /editsettings CSRF for user account creation.

Session Riding

An issue was discovered in PRTG Network Monitor before 21.1.66.1623
CVE-2021-27220 5.3 - Medium - March 31, 2021

An issue was discovered in PRTG Network Monitor before 21.1.66.1623. By invoking the screenshot functionality with prepared context paths, an attacker is able to verify the existence of certain files on the filesystem of the PRTG's Web server.

XSS exists in PRTG Network Monitor 20.1.56.1574 via crafted map properties
CVE-2020-14073 5.4 - Medium - June 23, 2020

XSS exists in PRTG Network Monitor 20.1.56.1574 via crafted map properties. An attacker with Read/Write privileges can create a map, and then use the Map Designer Properties screen to insert JavaScript code. This can be exploited against any user with View Maps or Edit Maps access.

XSS

PRTG Network Monitor before 20.1.57.1745
CVE-2020-11547 - April 05, 2020

PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm.

A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56
CVE-2020-10374 9.8 - Critical - March 30, 2020

A webserver component in Paessler PRTG Network Monitor 19.2.50 to PRTG 20.1.56 allows unauthenticated remote command execution via a crafted POST request or the what parameter of the screenshot function in the Contact Support form.

Improper Input Validation

A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below
CVE-2019-11074 7.2 - High - March 17, 2020

A Write to Arbitrary Location in Disk vulnerability exists in PRTG Network Monitor 19.1.49 and below that allows attackers to place files in arbitrary locations with SYSTEM privileges (although not controlling the contents of such files) due to insufficient sanitisation when passing arguments to the phantomjs.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Full Web Page Sensor and set specific settings when executing the sensor.

Unrestricted File Upload

A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506
CVE-2019-11073 7.2 - High - March 16, 2020

A Remote Code Execution vulnerability exists in PRTG Network Monitor before 19.4.54.1506 that allows attackers to execute code due to insufficient sanitization when passing arguments to the HttpTransactionSensor.exe binary. In order to exploit the vulnerability, remote authenticated administrators need to create a new HTTP Transaction Sensor and set specific settings when the sensor is executed.

Injection

An issue was discovered in PRTG 7.x through 19.4.53
CVE-2019-19119 - February 03, 2020

An issue was discovered in PRTG 7.x through 19.4.53. Due to insufficient access control on local registry keys for the Core Server Service, a non-administrative user on the local machine is able to access administrative credentials.

PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter
CVE-2019-9207 - December 31, 2019

PRTG Network Monitor v7.1.3.3378 allows XSS via the /search.htm searchtext parameter. NOTE: This product is discontinued.

PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter
CVE-2019-9206 - December 31, 2019

PRTG Network Monitor v7.1.3.3378 allows XSS via the /public/login.htm errormsg or loginurl parameter. NOTE: This product is discontinued.

PRTG before 19.1.49.1966 has Cross Site Scripting (XSS) in the WEBGUI.
CVE-2018-14683 - April 10, 2019

PRTG before 19.1.49.1966 has Cross Site Scripting (XSS) in the WEBGUI.

PRTG Network Monitor before 18.2.40.1683
CVE-2018-19411 8.8 - High - November 21, 2018

PRTG Network Monitor before 18.2.40.1683 allows an authenticated user with a read-only account to create another user with a read-write account (including administrator) via an HTTP request because /api/addusers doesn't check, or doesn't properly check, user rights.

Improper Privilege Management

PRTG Network Monitor before 18.2.40.1683
CVE-2018-19410 9.8 - Critical - November 21, 2018

PRTG Network Monitor before 18.2.40.1683 allows remote unauthenticated attackers to create users with read-write privileges (including administrator). A remote unauthenticated user can craft an HTTP request and override attributes of the 'include' directive in /public/login.htm and perform a Local File Inclusion attack, by including /api/addusers and executing it. By providing the 'id' and 'users' parameters, an unauthenticated attacker can create a user with read-write privileges (including administrator).

PRTG Network Monitor before 18.2.41.1652
CVE-2018-19203 7.5 - High - November 12, 2018

PRTG Network Monitor before 18.2.41.1652 allows remote unauthenticated attackers to terminate the PRTG Core Server Service via a special HTTP request.

PRTG Network Monitor before 18.3.44.2054
CVE-2018-19204 8.8 - High - November 12, 2018

PRTG Network Monitor before 18.3.44.2054 allows a remote authenticated attacker (with read-write privileges) to execute arbitrary code and OS commands with system privileges. When creating an HTTP Advanced Sensor, the user's input in the POST parameter 'proxyport_' is mishandled. The attacker can craft an HTTP request and override the 'writeresult' command-line parameter for HttpAdvancedSensor.exe to store arbitrary data in an arbitrary place on the file system. For example, the attacker can create an executable file in the \Custom Sensors\EXE directory and execute it by creating EXE/Script Sensor.

Improper Input Validation

An issue was discovered in PRTG Network Monitor before 18.2.39
CVE-2018-9276 7.2 - High - July 02, 2018

An issue was discovered in PRTG Network Monitor before 18.2.39. An attacker who has access to the PRTG System Administrator web console with administrative privileges can exploit an OS command injection vulnerability (both on the server and on devices) by sending malformed parameters in sensor or notification management scenarios.

Shell injection

Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.
CVE-2018-10253 - April 21, 2018

Paessler PRTG Network Monitor before 18.1.39.1648 mishandles stack memory during unspecified API calls.

Paessler PRTG before 16.2.24.4045 has XSS
CVE-2016-5078 6.1 - Medium - April 10, 2017

Paessler PRTG before 16.2.24.4045 has XSS via SNMP.

XSS

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Paessler Prtg Network Monitor or by Paessler? Click the Watch button to subscribe.

Paessler
Vendor

subscribe