CVE-2022-24869: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.
AI Analysis
Technical Summary
CVE-2022-24869 is a medium-severity cross-site scripting (XSS) vulnerability affecting the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions from 0.90 up to, but not including, 10.0.0. It arises due to improper neutralization of input during web page generation (CWE-79), specifically in the handling of ticket follow-ups and login messages where a stylesheet link can be injected. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users. Although modern browsers partially mitigate the risk through Cross-Origin Resource Sharing (CORS) policies, the vulnerability still poses a risk of executing unauthorized scripts in the context of authenticated users. Exploitation does not require authentication or user interaction beyond viewing the affected pages, increasing the attack surface. No known exploits have been reported in the wild to date, but the presence of this vulnerability in a widely deployed IT management tool makes it a potential target for attackers aiming to compromise confidentiality, integrity, or availability of organizational IT services.
Potential Impact
For European organizations utilizing GLPI versions prior to 10.0.0, this vulnerability could lead to unauthorized script execution within the context of the GLPI web application. Potential impacts include session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and the injection of malicious payloads that could pivot to further internal network compromise. Given GLPI's role in managing IT assets and service desks, exploitation could disrupt IT operations, leak sensitive asset management data, or facilitate lateral movement within networks. The partial mitigation by browser CORS policies reduces but does not eliminate risk, especially in environments where users may use outdated browsers or where CORS policies are misconfigured. The vulnerability's medium severity reflects a moderate risk that could escalate if combined with other vulnerabilities or social engineering attacks. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.0 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Review and sanitize all user inputs related to ticket follow-ups and login messages, ensuring that any HTML or stylesheet links are properly validated and escaped. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities within GLPI deployments. 5. Educate users on the risks of clicking unknown links or executing scripts within the GLPI interface. 6. Monitor web server and application logs for unusual activity that may indicate attempted exploitation. 7. If upgrading immediately is not feasible, consider isolating GLPI instances behind strict network controls and limiting access to trusted users only. 8. Ensure browsers used to access GLPI are up to date to benefit from the latest CORS and security features.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2022-24869: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2022-24869 is a medium-severity cross-site scripting (XSS) vulnerability affecting the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions from 0.90 up to, but not including, 10.0.0. It arises due to improper neutralization of input during web page generation (CWE-79), specifically in the handling of ticket follow-ups and login messages where a stylesheet link can be injected. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users. Although modern browsers partially mitigate the risk through Cross-Origin Resource Sharing (CORS) policies, the vulnerability still poses a risk of executing unauthorized scripts in the context of authenticated users. Exploitation does not require authentication or user interaction beyond viewing the affected pages, increasing the attack surface. No known exploits have been reported in the wild to date, but the presence of this vulnerability in a widely deployed IT management tool makes it a potential target for attackers aiming to compromise confidentiality, integrity, or availability of organizational IT services.
Potential Impact
For European organizations utilizing GLPI versions prior to 10.0.0, this vulnerability could lead to unauthorized script execution within the context of the GLPI web application. Potential impacts include session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and the injection of malicious payloads that could pivot to further internal network compromise. Given GLPI's role in managing IT assets and service desks, exploitation could disrupt IT operations, leak sensitive asset management data, or facilitate lateral movement within networks. The partial mitigation by browser CORS policies reduces but does not eliminate risk, especially in environments where users may use outdated browsers or where CORS policies are misconfigured. The vulnerability's medium severity reflects a moderate risk that could escalate if combined with other vulnerabilities or social engineering attacks. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.0 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Review and sanitize all user inputs related to ticket follow-ups and login messages, ensuring that any HTML or stylesheet links are properly validated and escaped. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities within GLPI deployments. 5. Educate users on the risks of clicking unknown links or executing scripts within the GLPI interface. 6. Monitor web server and application logs for unusual activity that may indicate attempted exploitation. 7. If upgrading immediately is not feasible, consider isolating GLPI instances behind strict network controls and limiting access to trusted users only. 8. Ensure browsers used to access GLPI are up to date to benefit from the latest CORS and security features.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf2d41
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 10:07:41 AM
Last updated: 2/4/2026, 6:09:09 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-67850: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67849: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HighCVE-2025-67848: Improper Handling of Insufficient Permissions or Privileges
HighCVE-2025-29867: CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') in Hancom Inc. Hancom Office 2018
HighCVE-2026-1791: CWE-434 Unrestricted Upload of File with Dangerous Type in Hillstone Networks Operation and Maintenance Security Gateway
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.