CVE-2022-24876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-24876 is a cross-site scripting (XSS) vulnerability identified in the GLPI project management and IT asset management software, specifically affecting versions prior to 10.0.1. GLPI is widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability resides in the Kanban view feature, which displays projects, tickets, changes, or problems on a task board. An attacker can exploit this vulnerability by injecting malicious HTML or JavaScript code into the user name field. Because the application improperly neutralizes input during web page generation (CWE-79), the injected code is executed in the context of other users viewing the Kanban board. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability does not require prior authentication to inject the payload, but exploitation depends on the victim accessing the affected Kanban view where the malicious user name is displayed. There are no known workarounds, and the vendor recommends upgrading to version 10.0.1 or later where the issue is fixed. No public exploits have been reported in the wild as of the publication date, but the nature of XSS vulnerabilities makes them a persistent risk, especially in environments with multiple users and sensitive data.
Potential Impact
For European organizations using GLPI versions prior to 10.0.1, this vulnerability poses a moderate risk to confidentiality and integrity. Attackers could execute arbitrary scripts in the browsers of users who view the Kanban board, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within GLPI. This could lead to unauthorized access to sensitive IT asset information, service desk tickets, or license data. While the vulnerability does not directly impact system availability, successful exploitation could facilitate further attacks or data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks and reputational damage if exploited. The risk is heightened in environments where GLPI is accessible to multiple users with varying privilege levels, especially if user input is not otherwise sanitized or monitored.
Mitigation Recommendations
The primary mitigation is to upgrade GLPI installations to version 10.0.1 or later, where the vulnerability is patched. Organizations should prioritize this upgrade in their patch management cycles. In the interim, administrators should restrict access to the Kanban view to trusted users only and monitor user name inputs for suspicious or malformed content. Implementing web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting the Kanban interface can provide additional protection. Logging and alerting on unusual user name changes or injection attempts can help detect exploitation attempts early. Security teams should educate users about the risks of clicking on suspicious links or interacting with untrusted content within GLPI. Finally, regular security assessments and code reviews of custom GLPI plugins or integrations should be conducted to ensure no additional injection vectors exist.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2022-24876: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Kanban is a GLPI view to display Projects, Tickets, Changes or Problems on a task board. In versions prior to 10.0.1 a user can exploit a cross site scripting vulnerability in Kanban by injecting HTML code in its user name. Users are advised to upgrade. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-24876 is a cross-site scripting (XSS) vulnerability identified in the GLPI project management and IT asset management software, specifically affecting versions prior to 10.0.1. GLPI is widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability resides in the Kanban view feature, which displays projects, tickets, changes, or problems on a task board. An attacker can exploit this vulnerability by injecting malicious HTML or JavaScript code into the user name field. Because the application improperly neutralizes input during web page generation (CWE-79), the injected code is executed in the context of other users viewing the Kanban board. This can lead to session hijacking, credential theft, or unauthorized actions performed on behalf of the victim user. The vulnerability does not require prior authentication to inject the payload, but exploitation depends on the victim accessing the affected Kanban view where the malicious user name is displayed. There are no known workarounds, and the vendor recommends upgrading to version 10.0.1 or later where the issue is fixed. No public exploits have been reported in the wild as of the publication date, but the nature of XSS vulnerabilities makes them a persistent risk, especially in environments with multiple users and sensitive data.
Potential Impact
For European organizations using GLPI versions prior to 10.0.1, this vulnerability poses a moderate risk to confidentiality and integrity. Attackers could execute arbitrary scripts in the browsers of users who view the Kanban board, potentially stealing session cookies, redirecting users to malicious sites, or performing unauthorized actions within GLPI. This could lead to unauthorized access to sensitive IT asset information, service desk tickets, or license data. While the vulnerability does not directly impact system availability, successful exploitation could facilitate further attacks or data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance risks and reputational damage if exploited. The risk is heightened in environments where GLPI is accessible to multiple users with varying privilege levels, especially if user input is not otherwise sanitized or monitored.
Mitigation Recommendations
The primary mitigation is to upgrade GLPI installations to version 10.0.1 or later, where the vulnerability is patched. Organizations should prioritize this upgrade in their patch management cycles. In the interim, administrators should restrict access to the Kanban view to trusted users only and monitor user name inputs for suspicious or malformed content. Implementing web application firewalls (WAFs) with custom rules to detect and block common XSS payloads targeting the Kanban interface can provide additional protection. Logging and alerting on unusual user name changes or injection attempts can help detect exploitation attempts early. Security teams should educate users about the risks of clicking on suspicious links or interacting with untrusted content within GLPI. Finally, regular security assessments and code reviews of custom GLPI plugins or integrations should be conducted to ensure no additional injection vectors exist.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-02-10T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9843c4522896dcbf321d
Added to database: 5/21/2025, 9:09:23 AM
Last enriched: 6/23/2025, 6:50:04 AM
Last updated: 7/28/2025, 7:10:16 AM
Views: 11
Related Threats
CVE-2025-8921: SQL Injection in code-projects Job Diary
MediumCVE-2025-8920: Cross Site Scripting in Portabilis i-Diario
MediumCVE-2025-45316: n/a
UnknownCVE-2025-45314: n/a
UnknownCVE-2025-8919: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.