
CVE-2025-25192 – GLPI allows unauthorized access to debug mode
https://notcve.org/view.php?id=CVE-2025-25192
25 Feb 2025 — GLPI is a free asset and IT management software package. Prior to version 10.0.18, a low privileged user can enable debug mode and access sensitive information. Version 10.0.18 contains a patch. As a workaround, one may delete the `install/update.php` file. • https://github.com/glpi-project/glpi/releases/tag/10.0.18 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVE-2025-21627 – GLPI Cross-site Scripting vulnerability
https://notcve.org/view.php?id=CVE-2025-21627
25 Feb 2025 — GLPI is a free asset and IT management software package. In versions prior to 10.0.18, a malicious link can be crafted to perform a reflected XSS attack on the search page. If the anonymous ticket creation is enabled, this attack can be performed by an unauthenticated user. Version 10.0.18 contains a fix for the issue. • https://github.com/glpi-project/glpi/security/advisories/GHSA-qm8p-jmj2-qfc2 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-41678 – GLPI has multiple reflected XSS
https://notcve.org/view.php?id=CVE-2024-41678
15 Nov 2024 — GLPI is a free asset and IT management software package. An unauthenticated user can provide a malicious link to a GLPI technician in order to exploit a reflected XSS vulnerability. Upgrade to 10.0.17. • https://github.com/glpi-project/glpi/security/advisories/GHSA-xwmx-mmrf-hqf9 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-31456 – GLPI contains an authenticated SQL injection
https://notcve.org/view.php?id=CVE-2024-31456
07 May 2024 — GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability from map search. This vulnerability is fixed in 10.0.15. GLPI es un paquete gratuito de software de gestión de TI y activos. Antes de 10.0.15, un usuario autenticado podía aprovechar una vulnerabilidad de inyección SQL desde la búsqueda de mapas. • https://github.com/glpi-project/glpi/commit/730c3db29a1edc32f9b9d1e2a940e90a0211ab26 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2024-29889 – GLPI contains an SQL injection through the saved searches
https://notcve.org/view.php?id=CVE-2024-29889
07 May 2024 — GLPI is a Free Asset and IT Management Software package. Prior to 10.0.15, an authenticated user can exploit a SQL injection vulnerability in the saved searches feature to alter another user account data take control of it. This vulnerability is fixed in 10.0.15. GLPI es un paquete gratuito de software de gestión de TI y activos. Antes de 10.0.15, un usuario autenticado podía explotar una vulnerabilidad de inyección SQL en la función de búsquedas guardadas para alterar los datos de la cuenta de otro usuario... • https://github.com/glpi-project/glpi/commit/0a6b28be4c0f848106c60b554c703ec2e178d6c7 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-37278 – GLPI vulnerable to SQL injection via dashboard administration
https://notcve.org/view.php?id=CVE-2023-37278
13 Jul 2023 — GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9. • https://github.com/glpi-project/glpi/releases/tag/10.0.9 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2023-28838 – GLPI vulnerable to SQL injection through dynamic reports
https://notcve.org/view.php?id=CVE-2023-28838
05 Apr 2023 — GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user. • https://github.com/glpi-project/glpi/releases/tag/10.0.7 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVE-2022-39276 – Blind Server-Side Request Forgery (SSRF) in RSS feeds and planning
https://notcve.org/view.php?id=CVE-2022-39276
03 Nov 2022 — GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or an external calendar in planning is subject to SSRF exploit. In case a remote script returns a redirect response, the redirect target URL is not checked against the URL allow list defined by administrator. This issue has been patched, please upgrade to 10.0.4. • https://github.com/glpi-project/glpi/security/advisories/GHSA-8vwg-7x42-7v6p • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2022-39234 – user session persists even after permanently deleting account in GLPI
https://notcve.org/view.php?id=CVE-2022-39234
03 Nov 2022 — GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Deleted/deactivated user could continue to use their account as long as its cookie is valid. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds. • https://github.com/glpi-project/glpi/security/advisories/GHSA-pgcx-mc58-3gmg • CWE-613: Insufficient Session Expiration •

CVE-2022-35914 – Teclib GLPI Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2022-35914
19 Sep 2022 — /vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection. El archivo /vendor/htmlawed/htmlawed/htmLawedTest.php en el módulo htmlawed para GLPI versiones hasta 10.0.2, permite una inyección de código PHP Teclib GLPI contains a remote code execution vulnerability in the third-party library, htmlawed. • https://packetstorm.news/files/id/178425 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') •