CVE-2022-24869: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.
AI Analysis
Technical Summary
CVE-2022-24869 is a medium-severity cross-site scripting (XSS) vulnerability affecting the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions from 0.90 up to, but not including, 10.0.0. It arises due to improper neutralization of input during web page generation (CWE-79), specifically in the handling of ticket follow-ups and login messages where a stylesheet link can be injected. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users. Although modern browsers partially mitigate the risk through Cross-Origin Resource Sharing (CORS) policies, the vulnerability still poses a risk of executing unauthorized scripts in the context of authenticated users. Exploitation does not require authentication or user interaction beyond viewing the affected pages, increasing the attack surface. No known exploits have been reported in the wild to date, but the presence of this vulnerability in a widely deployed IT management tool makes it a potential target for attackers aiming to compromise confidentiality, integrity, or availability of organizational IT services.
Potential Impact
For European organizations utilizing GLPI versions prior to 10.0.0, this vulnerability could lead to unauthorized script execution within the context of the GLPI web application. Potential impacts include session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and the injection of malicious payloads that could pivot to further internal network compromise. Given GLPI's role in managing IT assets and service desks, exploitation could disrupt IT operations, leak sensitive asset management data, or facilitate lateral movement within networks. The partial mitigation by browser CORS policies reduces but does not eliminate risk, especially in environments where users may use outdated browsers or where CORS policies are misconfigured. The vulnerability's medium severity reflects a moderate risk that could escalate if combined with other vulnerabilities or social engineering attacks. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.0 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Review and sanitize all user inputs related to ticket follow-ups and login messages, ensuring that any HTML or stylesheet links are properly validated and escaped. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities within GLPI deployments. 5. Educate users on the risks of clicking unknown links or executing scripts within the GLPI interface. 6. Monitor web server and application logs for unusual activity that may indicate attempted exploitation. 7. If upgrading immediately is not feasible, consider isolating GLPI instances behind strict network controls and limiting access to trusted users only. 8. Ensure browsers used to access GLPI are up to date to benefit from the latest CORS and security features.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2022-24869: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2022-24869 is a medium-severity cross-site scripting (XSS) vulnerability affecting the GLPI software, an open-source IT asset and service management platform widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions from 0.90 up to, but not including, 10.0.0. It arises due to improper neutralization of input during web page generation (CWE-79), specifically in the handling of ticket follow-ups and login messages where a stylesheet link can be injected. This flaw allows an attacker to inject malicious scripts into web pages viewed by other users. Although modern browsers partially mitigate the risk through Cross-Origin Resource Sharing (CORS) policies, the vulnerability still poses a risk of executing unauthorized scripts in the context of authenticated users. Exploitation does not require authentication or user interaction beyond viewing the affected pages, increasing the attack surface. No known exploits have been reported in the wild to date, but the presence of this vulnerability in a widely deployed IT management tool makes it a potential target for attackers aiming to compromise confidentiality, integrity, or availability of organizational IT services.
Potential Impact
For European organizations utilizing GLPI versions prior to 10.0.0, this vulnerability could lead to unauthorized script execution within the context of the GLPI web application. Potential impacts include session hijacking, credential theft, unauthorized actions performed on behalf of legitimate users, and the injection of malicious payloads that could pivot to further internal network compromise. Given GLPI's role in managing IT assets and service desks, exploitation could disrupt IT operations, leak sensitive asset management data, or facilitate lateral movement within networks. The partial mitigation by browser CORS policies reduces but does not eliminate risk, especially in environments where users may use outdated browsers or where CORS policies are misconfigured. The vulnerability's medium severity reflects a moderate risk that could escalate if combined with other vulnerabilities or social engineering attacks. Organizations in sectors with high regulatory requirements for data protection, such as finance, healthcare, and government, may face compliance risks if this vulnerability is exploited.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.0 or later, where this vulnerability has been addressed, is the most effective mitigation. 2. Implement strict Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. 3. Review and sanitize all user inputs related to ticket follow-ups and login messages, ensuring that any HTML or stylesheet links are properly validated and escaped. 4. Conduct regular security audits and penetration testing focused on web application vulnerabilities within GLPI deployments. 5. Educate users on the risks of clicking unknown links or executing scripts within the GLPI interface. 6. Monitor web server and application logs for unusual activity that may indicate attempted exploitation. 7. If upgrading immediately is not feasible, consider isolating GLPI instances behind strict network controls and limiting access to trusted users only. 8. Ensure browsers used to access GLPI are up to date to benefit from the latest CORS and security features.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf2d41
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 10:07:41 AM
Last updated: 7/31/2025, 10:09:44 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.