CVE-2022-21720: n/a in n/a
GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
AI Analysis
Technical Summary
CVE-2022-21720 is a medium-severity SQL injection vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management. The vulnerability exists in versions prior to 9.5.7 and allows an entity administrator—who normally has restricted privileges limited to their own entity—to retrieve data that should be inaccessible. This is achieved through improper sanitization of input parameters in SQL queries, enabling the attacker to manipulate the query logic and extract sensitive information from the database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection flaw. Exploitation does not require user interaction but does require the attacker to have entity administrator privileges, which limits the attack surface to insiders or compromised accounts with elevated rights. The vulnerability does not impact data integrity or availability but compromises confidentiality by exposing sensitive data. The issue was patched in GLPI version 9.5.7, and as a temporary workaround, disabling the 'Entities' update right for entity administrators prevents exploitation. No known exploits are reported in the wild, but the presence of this vulnerability in a widely deployed IT management tool poses a risk if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-21720 can be significant, especially for those relying on GLPI for IT asset and service management. The ability for an entity administrator to access unauthorized data could lead to exposure of sensitive organizational information, including asset inventories, user data, or configuration details. This could facilitate further attacks such as privilege escalation, targeted phishing, or lateral movement within the network. Confidentiality breaches may also have regulatory implications under GDPR, potentially resulting in legal and financial penalties. Since GLPI is often used in public sector, education, and enterprise environments across Europe, the vulnerability could affect critical infrastructure management and IT operations. However, the requirement for elevated privileges reduces the risk from external attackers but increases the threat from insider misuse or compromised accounts. The lack of impact on integrity and availability means the vulnerability is less likely to cause operational disruption but remains a serious data confidentiality concern.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 9.5.7 or later to apply the official patch addressing CVE-2022-21720. Until the upgrade can be performed, administrators should disable the 'Entities' update right for entity administrators to prevent exploitation. Additionally, organizations should audit entity administrator accounts for suspicious activity and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. Regularly reviewing and minimizing privileges assigned to entity administrators can limit the potential attack surface. Network segmentation and monitoring of database queries related to GLPI can help detect anomalous access patterns indicative of exploitation attempts. Finally, organizations should ensure that backups and incident response plans are in place to respond to any potential data breaches resulting from this vulnerability.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2022-21720: n/a in n/a
Description
GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2022-21720 is a medium-severity SQL injection vulnerability affecting GLPI, a free and open-source asset and IT management software widely used for IT service management. The vulnerability exists in versions prior to 9.5.7 and allows an entity administrator—who normally has restricted privileges limited to their own entity—to retrieve data that should be inaccessible. This is achieved through improper sanitization of input parameters in SQL queries, enabling the attacker to manipulate the query logic and extract sensitive information from the database. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command), indicating a classic SQL injection flaw. Exploitation does not require user interaction but does require the attacker to have entity administrator privileges, which limits the attack surface to insiders or compromised accounts with elevated rights. The vulnerability does not impact data integrity or availability but compromises confidentiality by exposing sensitive data. The issue was patched in GLPI version 9.5.7, and as a temporary workaround, disabling the 'Entities' update right for entity administrators prevents exploitation. No known exploits are reported in the wild, but the presence of this vulnerability in a widely deployed IT management tool poses a risk if not remediated promptly.
Potential Impact
For European organizations, the impact of CVE-2022-21720 can be significant, especially for those relying on GLPI for IT asset and service management. The ability for an entity administrator to access unauthorized data could lead to exposure of sensitive organizational information, including asset inventories, user data, or configuration details. This could facilitate further attacks such as privilege escalation, targeted phishing, or lateral movement within the network. Confidentiality breaches may also have regulatory implications under GDPR, potentially resulting in legal and financial penalties. Since GLPI is often used in public sector, education, and enterprise environments across Europe, the vulnerability could affect critical infrastructure management and IT operations. However, the requirement for elevated privileges reduces the risk from external attackers but increases the threat from insider misuse or compromised accounts. The lack of impact on integrity and availability means the vulnerability is less likely to cause operational disruption but remains a serious data confidentiality concern.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 9.5.7 or later to apply the official patch addressing CVE-2022-21720. Until the upgrade can be performed, administrators should disable the 'Entities' update right for entity administrators to prevent exploitation. Additionally, organizations should audit entity administrator accounts for suspicious activity and enforce strong authentication mechanisms, such as multi-factor authentication, to reduce the risk of account compromise. Regularly reviewing and minimizing privileges assigned to entity administrators can limit the potential attack surface. Network segmentation and monitoring of database queries related to GLPI can help detect anomalous access patterns indicative of exploitation attempts. Finally, organizations should ensure that backups and incident response plans are in place to respond to any potential data breaches resulting from this vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2021-11-16T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d981ec4522896dcbdbe7a
Added to database: 5/21/2025, 9:08:46 AM
Last enriched: 7/6/2025, 11:25:17 PM
Last updated: 2/7/2026, 2:57:48 PM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.