Sensitive Information Exposure in GLPI IT Management Software
CVE-2025-21626

5.8MEDIUM

Key Information:

Status
Vendor
CVE Published:
25 February 2025

Summary

GLPI, a widely used free asset and IT management software, is susceptible to a vulnerability that allows anonymous users to access sensitive information via the status.php endpoint. This flaw is present in versions from 0.71 up to 10.0.17. The issue can lead to unauthorized disclosure of critical data, impacting the security of the system. Version 10.0.18 resolves this vulnerability. As immediate workarounds, users are advised to delete the status.php file, restrict access to it, or sanitize any sensitive values from the name field of active LDAP directories and mail authentication providers.

Affected Version(s)

glpi >= 0.71, < 10.0.18

References

CVSS V3.1

Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.