CVE-2022-21720: n/a in n/a
GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
AI Analysis
Technical Summary
CVE-2022-21720 is a medium-severity SQL injection vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management. The vulnerability exists in versions prior to 9.5.7 and allows an entity administrator—who normally has restricted privileges limited to their own entity—to retrieve data that should be inaccessible. This is achieved through improper sanitization of input parameters in SQL queries, enabling the attacker to manipulate the query logic and extract sensitive information from the database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection flaw. Exploitation does not require user interaction but does require the attacker to have entity administrator privileges, which limits the attack surface to insiders or compromised accounts with elevated rights. The vulnerability does not impact data integrity or availability but compromises confidentiality by exposing sensitive data. The issue was patched in GLPI version 9.5.7, and as a temporary workaround, disabling the 'Entities' update right for entity administrators prevents exploitation. No known exploits are reported in the wild, but the presence of this vulnerability in a widely deployed IT management tool poses a risk if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-21720 can be significant, especially for those relying on GLPI for IT asset and service management. The ability for an entity administrator to access unauthorized data could lead to exposure of sensitive organizational information, including asset inventories, user data, or configuration details. This could facilitate further attacks such as privilege escalation, targeted phishing, or lateral movement within the network. Confidentiality breaches may also have regulatory implications under GDPR, potentially resulting in legal and financial penalties. Since GLPI is often used in public sector, education, and enterprise environments across Europe, the vulnerability could affect critical infrastructure management and IT operations. However, the requirement for elevated privileges reduces the risk from external attackers but increases the threat from insider misuse or compromised accounts. The lack of impact on integrity and availability means the vulnerability is less likely to cause operational disruption but remains a serious data confidentiality concern.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 9.5.7 or later to apply the official patch addressing CVE-2022-21720. Until the upgrade can be performed, administrators should disable the 'Entities' update right for entity administrators to prevent exploitation. Additionally, organizations should audit entity administrator accounts for suspicious activity and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. Regularly reviewing and minimizing privileges assigned to entity administrators can limit the potential attack surface. Network segmentation and monitoring of database queries related to GLPI can help detect anomalous access patterns indicative of exploitation attempts. Finally, organizations should ensure that backups and incident response plans are in place to respond to any potential data breaches resulting from this vulnerability.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-21720: n/a in n/a
Description
GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-21720 is a medium-severity SQL injection vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management. The vulnerability exists in versions prior to 9.5.7 and allows an entity administrator—who normally has restricted privileges limited to their own entity—to retrieve data that should be inaccessible. This is achieved through improper sanitization of input parameters in SQL queries, enabling the attacker to manipulate the query logic and extract sensitive information from the database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection flaw. Exploitation does not require user interaction but does require the attacker to have entity administrator privileges, which limits the attack surface to insiders or compromised accounts with elevated rights. The vulnerability does not impact data integrity or availability but compromises confidentiality by exposing sensitive data. The issue was patched in GLPI version 9.5.7, and as a temporary workaround, disabling the 'Entities' update right for entity administrators prevents exploitation. No known exploits are reported in the wild, but the presence of this vulnerability in a widely deployed IT management tool poses a risk if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-21720 can be significant, especially for those relying on GLPI for IT asset and service management. The ability for an entity administrator to access unauthorized data could lead to exposure of sensitive organizational information, including asset inventories, user data, or configuration details. This could facilitate further attacks such as privilege escalation, targeted phishing, or lateral movement within the network. Confidentiality breaches may also have regulatory implications under GDPR, potentially resulting in legal and financial penalties. Since GLPI is often used in public sector, education, and enterprise environments across Europe, the vulnerability could affect critical infrastructure management and IT operations. However, the requirement for elevated privileges reduces the risk from external attackers but increases the threat from insider misuse or compromised accounts. The lack of impact on integrity and availability means the vulnerability is less likely to cause operational disruption but remains a serious data confidentiality concern.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 9.5.7 or later to apply the official patch addressing CVE-2022-21720. Until the upgrade can be performed, administrators should disable the 'Entities' update right for entity administrators to prevent exploitation. Additionally, organizations should audit entity administrator accounts for suspicious activity and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. Regularly reviewing and minimizing privileges assigned to entity administrators can limit the potential attack surface. Network segmentation and monitoring of database queries related to GLPI can help detect anomalous access patterns indicative of exploitation attempts. Finally, organizations should ensure that backups and incident response plans are in place to respond to any potential data breaches resulting from this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbe7a
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:25:17 PM
Last updated: 8/4/2025, 12:51:24 PM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.