Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-31056: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

0
Medium
Published: Tue Jun 28 2022 (06/28/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.

AI-Powered Analysis

AILast updated: 06/23/2025, 04:05:36 UTC

Technical Analysis

CVE-2022-31056 is a medium-severity SQL Injection vulnerability (CWE-89) affecting the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2, specifically in all assistance forms such as Ticket, Change, and Problem forms. These forms improperly neutralize special elements in the 'actor' fields, allowing an attacker to inject malicious SQL commands. This improper input sanitization can lead to unauthorized database queries, potentially exposing sensitive information, modifying data, or disrupting service availability. The issue was addressed and fixed in GLPI version 10.0.2. No known exploits have been reported in the wild as of the published date, but the vulnerability presents a significant risk if left unpatched, especially given GLPI's role in managing critical IT infrastructure and service workflows.

Potential Impact

For European organizations, the impact of this vulnerability could be substantial due to GLPI's adoption in various sectors including government agencies, healthcare, education, and private enterprises managing complex IT environments. Exploitation could lead to unauthorized access to sensitive asset and service management data, including user credentials, configuration details, and operational tickets. This could compromise confidentiality and integrity of IT management processes, potentially enabling further lateral movement within networks or disruption of IT service management workflows. The availability of ITIL service desks could also be affected if attackers manipulate or delete critical records. Given the central role GLPI plays in IT operations, exploitation could degrade organizational response capabilities and increase downtime, impacting business continuity and regulatory compliance, particularly under GDPR requirements for data protection.

Mitigation Recommendations

Organizations should immediately verify their GLPI version and upgrade to version 10.0.2 or later to remediate this vulnerability. Beyond patching, it is recommended to audit all input validation mechanisms in GLPI customizations or integrations to ensure no residual injection vectors remain. Implementing Web Application Firewalls (WAF) with SQL injection detection rules tailored to GLPI's request patterns can provide additional protection. Regularly review and restrict database user privileges used by GLPI to minimize potential damage from injection attacks. Conduct thorough logging and monitoring of GLPI application logs and database queries to detect anomalous activities indicative of exploitation attempts. Finally, organizations should perform security awareness training for administrators managing GLPI to recognize and respond to suspicious behavior promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-05-18T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf35b5

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/23/2025, 4:05:36 AM

Last updated: 2/2/2026, 9:35:59 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats