CVE-2022-31056: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
AI Analysis
Technical Summary
CVE-2022-31056 is a medium-severity SQL Injection vulnerability (CWE-89) affecting the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2, specifically in all assistance forms such as Ticket, Change, and Problem forms. These forms improperly neutralize special elements in the 'actor' fields, allowing an attacker to inject malicious SQL commands. This improper input sanitization can lead to unauthorized database queries, potentially exposing sensitive information, modifying data, or disrupting service availability. The issue was addressed and fixed in GLPI version 10.0.2. No known exploits have been reported in the wild as of the published date, but the vulnerability presents a significant risk if left unpatched, especially given GLPI's role in managing critical IT infrastructure and service workflows.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial due to GLPI's adoption in various sectors including government agencies, healthcare, education, and private enterprises managing complex IT environments. Exploitation could lead to unauthorized access to sensitive asset and service management data, including user credentials, configuration details, and operational tickets. This could compromise confidentiality and integrity of IT management processes, potentially enabling further lateral movement within networks or disruption of IT service management workflows. The availability of ITIL service desks could also be affected if attackers manipulate or delete critical records. Given the central role GLPI plays in IT operations, exploitation could degrade organizational response capabilities and increase downtime, impacting business continuity and regulatory compliance, particularly under GDPR requirements for data protection.
Mitigation Recommendations
Organizations should immediately verify their GLPI version and upgrade to version 10.0.2 or later to remediate this vulnerability. Beyond patching, it is recommended to audit all input validation mechanisms in GLPI customizations or integrations to ensure no residual injection vectors remain. Implementing Web Application Firewalls (WAF) with SQL injection detection rules tailored to GLPI's request patterns can provide additional protection. Regularly review and restrict database user privileges used by GLPI to minimize potential damage from injection attacks. Conduct thorough logging and monitoring of GLPI application logs and database queries to detect anomalous activities indicative of exploitation attempts. Finally, organizations should perform security awareness training for administrators managing GLPI to recognize and respond to suspicious behavior promptly.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Poland
CVE-2022-31056: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all assistance forms (Ticket/Change/Problem) permit sql injection on the actor fields. This issue has been resolved in version 10.0.2 and all affected users are advised to upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2022-31056 is a medium-severity SQL Injection vulnerability (CWE-89) affecting the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desk operations, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2, specifically in all assistance forms such as Ticket, Change, and Problem forms. These forms improperly neutralize special elements in the 'actor' fields, allowing an attacker to inject malicious SQL commands. This improper input sanitization can lead to unauthorized database queries, potentially exposing sensitive information, modifying data, or disrupting service availability. The issue was addressed and fixed in GLPI version 10.0.2. No known exploits have been reported in the wild as of the published date, but the vulnerability presents a significant risk if left unpatched, especially given GLPI's role in managing critical IT infrastructure and service workflows.
Potential Impact
For European organizations, the impact of this vulnerability could be substantial due to GLPI's adoption in various sectors including government agencies, healthcare, education, and private enterprises managing complex IT environments. Exploitation could lead to unauthorized access to sensitive asset and service management data, including user credentials, configuration details, and operational tickets. This could compromise confidentiality and integrity of IT management processes, potentially enabling further lateral movement within networks or disruption of IT service management workflows. The availability of ITIL service desks could also be affected if attackers manipulate or delete critical records. Given the central role GLPI plays in IT operations, exploitation could degrade organizational response capabilities and increase downtime, impacting business continuity and regulatory compliance, particularly under GDPR requirements for data protection.
Mitigation Recommendations
Organizations should immediately verify their GLPI version and upgrade to version 10.0.2 or later to remediate this vulnerability. Beyond patching, it is recommended to audit all input validation mechanisms in GLPI customizations or integrations to ensure no residual injection vectors remain. Implementing Web Application Firewalls (WAF) with SQL injection detection rules tailored to GLPI's request patterns can provide additional protection. Regularly review and restrict database user privileges used by GLPI to minimize potential damage from injection attacks. Conduct thorough logging and monitoring of GLPI application logs and database queries to detect anomalous activities indicative of exploitation attempts. Finally, organizations should perform security awareness training for administrators managing GLPI to recognize and respond to suspicious behavior promptly.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf35b5
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 4:05:36 AM
Last updated: 8/1/2025, 12:45:25 AM
Views: 16
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.