Sensitive Information Exposure in GLPI IT Management Software
CVE-2025-21626
5.8MEDIUM
Summary
GLPI, a widely used free asset and IT management software, is susceptible to a vulnerability that allows anonymous users to access sensitive information via the status.php
endpoint. This flaw is present in versions from 0.71 up to 10.0.17. The issue can lead to unauthorized disclosure of critical data, impacting the security of the system. Version 10.0.18 resolves this vulnerability. As immediate workarounds, users are advised to delete the status.php
file, restrict access to it, or sanitize any sensitive values from the name
field of active LDAP directories and mail authentication providers.
Affected Version(s)
glpi >= 0.71, < 10.0.18
References
CVSS V3.1
Score:
5.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved