Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24869: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi

0
Medium
Published: Thu Apr 21 2022 (04/21/2022, 17:00:16 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.

AI-Powered Analysis

AILast updated: 06/23/2025, 10:07:41 UTC

Technical Analysis

CVE-2022-24869 is a medium-severity cross-site scripting (XSS) vulnerability affecting the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions from 0.90 up to, but not including, 10.0.0. It arises due to improper neutralization of input during web page generation (CWE-79), specifically in the handling of ticket follow-ups and login messages where a stylesheet link can be injected. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users. Although modern browsers partially mitigate the risk through Cross-Origin Resource Sharing (CORS) policies, the vulnerability still poses a risk of executing unauthorized scripts in the context of authenticated users. Exploitation does not require authentication or user interaction beyond viewing the affected pages, increasing the attack surface. No known exploits have been reported in the wild to date, but the presence of this vulnerability in a widely deployed IT management tool makes it a potential target for attackers aiming to compromise confidentiality, integrity, or availability of organizational IT services.

Potential Impact

For European organizations utilizing GLPI versions prior to 10.0.0, this vulnerability could lead to unauthorized script execution within the context of the GLPI web application. Potential impacts include session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and the injection of malicious payloads that could pivot to further internal network compromise. Given GLPI's role in managing IT assets and service desks, exploitation could disrupt IT operations, leak sensitive asset management data, or facilitate lateral movement within networks. The partial mitigation by browser CORS policies reduces but does not eliminate risk, especially in environments where users may use outdated browsers or where CORS policies are misconfigured. The vulnerability's medium severity reflects a moderate risk that could escalate if combined with other vulnerabilities or social engineering attacks. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if this vulnerability is exploited.

Mitigation Recommendations

1. Immediate upgrade to GLPI version 10.0.0 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Review and sanitize all user inputs related to ticket follow-ups and login messages, ensuring that any HTML or stylesheet links are properly validated and escaped. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities within GLPI deployments. 5. Educate users on the risks of clicking unknown links or executing scripts within the GLPI interface. 6. Monitor web server and application logs for unusual activity that may indicate attempted exploitation. 7. If upgrading immediately is not feasible, consider isolating GLPI instances behind strict network controls and limiting access to trusted users only. 8. Ensure browsers used to access GLPI are up to date to benefit from the latest CORS and security features.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf2d41

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 10:07:41 AM

Last updated: 2/7/2026, 9:54:56 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats