Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-24876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi

0
Medium
Published: Thu Jun 09 2022 (06/09/2022, 18:50:25 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.

AI-Powered Analysis

AILast updated: 06/23/2025, 06:50:04 UTC

Technical Analysis

CVE-2022-24876 is a cross-site scripting (XSS) vulnerability identified in the GLPI project management and IT asset management software, specifically affecting versions prior to 10.0.1. GLPI is widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability resides in the Kanban view feature, which displays projects, tickets, changes, or problems on a task board. An attacker can exploit this vulnerability by injecting malicious HTML or JavaScript code into the user name field. Because the application improperly neutralizes input during web page generation (CWE-79), the injected code is executed in the context of other users viewing the Kanban board. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability does not require prior authentication to inject the payload, but exploitation depends on the victim accessing the affected Kanban view where the malicious user name is displayed. There are no known workarounds, and the vendor recommends upgrading to version 10.0.1 or later where the issue is fixed. No public exploits have been reported in the wild as of the publication date, but the nature of XSS vulnerabilities makes them a persistent risk, especially in environments with multiple users and sensitive data.

Potential Impact

For European organizations using GLPI versions prior to 10.0.1, this vulnerability poses a moderate risk to confidentiality and integrity. Attackers could execute arbitrary scripts in the browsers of users who view the Kanban board, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within GLPI. This could lead to unauthorized access to sensitive IT asset information, service desk tickets, or license data. While the vulnerability does not directly impact system availability, successful exploitation could facilitate further attacks or data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks and reputational damage if exploited. The risk is heightened in environments where GLPI is accessible to multiple users with varying privilege levels, especially if user input is not otherwise sanitized or monitored.

Mitigation Recommendations

The primary mitigation is to upgrade GLPI installations to version 10.0.1 or later, where the vulnerability is patched. Organizations should prioritize this upgrade in their patch management cycles. In the interim, administrators should restrict access to the Kanban view to trusted users only and monitor user name inputs for suspicious or malformed content. Implementing web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting the Kanban interface can provide additional protection. Logging and alerting on unusual user name changes or injection attempts can help detect exploitation attempts early. Security teams should educate users about the risks of clicking on suspicious links or interacting with untrusted content within GLPI. Finally, regular security assessments and code reviews of custom GLPI plugins or integrations should be conducted to ensure no additional injection vectors exist.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9843c4522896dcbf321d

Added to database: 5/21/2025, 9:09:23 AM

Last enriched: 6/23/2025, 6:50:04 AM

Last updated: 2/4/2026, 8:05:53 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats