CVE-2022-21719: n/a in n/a
GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds.
AI Analysis
Technical Summary
CVE-2022-21719 is a reflected cross-site scripting (XSS) vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management and inventory. The vulnerability exists in all GLPI versions prior to 9.5.7. Reflected XSS occurs when untrusted user input is immediately returned by a web application without proper sanitization or encoding, allowing an attacker to inject malicious scripts into web pages viewed by other users. In this case, the vulnerability allows an attacker to craft a malicious URL or input that, when visited or submitted by a user, executes arbitrary JavaScript in the victim's browser context. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the user. The CVSS 3.1 base score is 6.1 (medium severity), reflecting that the vulnerability is remotely exploitable over the network without authentication (AV:N, PR:N), requires user interaction (UI:R), and impacts confidentiality and integrity (C:L, I:L) but not availability (A:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. There are no known exploits in the wild, and no workarounds exist other than applying the patch introduced in GLPI version 9.5.7. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. This vulnerability poses a risk primarily to organizations using GLPI versions before 9.5.7, especially those exposing the GLPI web interface to untrusted users or the internet. Attackers could leverage this vulnerability to steal user credentials, perform actions with the victim's privileges, or conduct phishing attacks by injecting malicious scripts. Given GLPI's role in IT asset and service management, compromise could lead to further lateral movement or data exposure within affected organizations.
Potential Impact
For European organizations, the impact of CVE-2022-21719 can be significant, particularly for those relying on GLPI for IT asset management and service desk operations. Exploitation of this reflected XSS vulnerability could allow attackers to hijack user sessions, steal authentication tokens, or manipulate user interactions, potentially leading to unauthorized access to sensitive IT management data. This could disrupt IT operations, expose confidential asset information, or enable further attacks within the network. Since GLPI often integrates with other IT systems and holds critical infrastructure data, a successful attack could facilitate lateral movement or privilege escalation. The risk is heightened for organizations with GLPI instances accessible over the internet or to untrusted internal users. Additionally, compliance with European data protection regulations such as GDPR means that any data breach or unauthorized access resulting from this vulnerability could lead to regulatory penalties and reputational damage. Although no known exploits are currently reported in the wild, the medium severity and ease of exploitation without authentication make timely patching essential to mitigate potential risks.
Mitigation Recommendations
To mitigate CVE-2022-21719, European organizations should prioritize upgrading all GLPI installations to version 9.5.7 or later, where the reflected XSS vulnerability has been patched. Since no workarounds exist, patching is the primary defense. Organizations should also review and harden access controls to the GLPI web interface, restricting access to trusted users and internal networks where possible. Implementing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads can provide an additional layer of defense. Security teams should conduct regular vulnerability scans and penetration tests focused on web application security to identify any residual or related issues. User awareness training is recommended to help users recognize suspicious URLs or unexpected prompts that could be part of an XSS attack. Logging and monitoring of GLPI access logs should be enhanced to detect unusual activities indicative of exploitation attempts. Finally, organizations should ensure secure coding practices and input validation are followed in any customizations or integrations with GLPI to prevent similar vulnerabilities.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium
CVE-2022-21719: n/a in n/a
Description
GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-21719 is a reflected cross-site scripting (XSS) vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management and inventory. The vulnerability exists in all GLPI versions prior to 9.5.7. Reflected XSS occurs when untrusted user input is immediately returned by a web application without proper sanitization or encoding, allowing an attacker to inject malicious scripts into web pages viewed by other users. In this case, the vulnerability allows an attacker to craft a malicious URL or input that, when visited or submitted by a user, executes arbitrary JavaScript in the victim's browser context. This can lead to session hijacking, credential theft, or other malicious actions performed on behalf of the user. The CVSS 3.1 base score is 6.1 (medium severity), reflecting that the vulnerability is remotely exploitable over the network without authentication (AV:N, PR:N), requires user interaction (UI:R), and impacts confidentiality and integrity (C:L, I:L) but not availability (A:N). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. There are no known exploits in the wild, and no workarounds exist other than applying the patch introduced in GLPI version 9.5.7. The vulnerability is classified under CWE-79, which covers improper neutralization of input leading to XSS. This vulnerability poses a risk primarily to organizations using GLPI versions before 9.5.7, especially those exposing the GLPI web interface to untrusted users or the internet. Attackers could leverage this vulnerability to steal user credentials, perform actions with the victim's privileges, or conduct phishing attacks by injecting malicious scripts. Given GLPI's role in IT asset and service management, compromise could lead to further lateral movement or data exposure within affected organizations.
Potential Impact
For European organizations, the impact of CVE-2022-21719 can be significant, particularly for those relying on GLPI for IT asset management and service desk operations. Exploitation of this reflected XSS vulnerability could allow attackers to hijack user sessions, steal authentication tokens, or manipulate user interactions, potentially leading to unauthorized access to sensitive IT management data. This could disrupt IT operations, expose confidential asset information, or enable further attacks within the network. Since GLPI often integrates with other IT systems and holds critical infrastructure data, a successful attack could facilitate lateral movement or privilege escalation. The risk is heightened for organizations with GLPI instances accessible over the internet or to untrusted internal users. Additionally, compliance with European data protection regulations such as GDPR means that any data breach or unauthorized access resulting from this vulnerability could lead to regulatory penalties and reputational damage. Although no known exploits are currently reported in the wild, the medium severity and ease of exploitation without authentication make timely patching essential to mitigate potential risks.
Mitigation Recommendations
To mitigate CVE-2022-21719, European organizations should prioritize upgrading all GLPI installations to version 9.5.7 or later, where the reflected XSS vulnerability has been patched. Since no workarounds exist, patching is the primary defense. Organizations should also review and harden access controls to the GLPI web interface, restricting access to trusted users and internal networks where possible. Implementing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads can provide an additional layer of defense. Security teams should conduct regular vulnerability scans and penetration tests focused on web application security to identify any residual or related issues. User awareness training is recommended to help users recognize suspicious URLs or unexpected prompts that could be part of an XSS attack. Logging and monitoring of GLPI access logs should be enhanced to detect unusual activities indicative of exploitation attempts. Finally, organizations should ensure secure coding practices and input validation are followed in any customizations or integrations with GLPI to prevent similar vulnerabilities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbe76
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:25:03 PM
Last updated: 8/5/2025, 12:21:48 PM
Views: 11
Related Threats
CVE-2025-27388: CWE-20 Improper Input Validation in OPPO OPPO HEALTH APP
HighCVE-2025-8949: Stack-based Buffer Overflow in D-Link DIR-825
HighCVE-2025-8948: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8947: SQL Injection in projectworlds Visitor Management System
MediumCVE-2025-8046: CWE-79 Cross-Site Scripting (XSS) in Injection Guard
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.