CVE-2022-31061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
AI Analysis
Technical Summary
CVE-2022-31061 is a SQL injection vulnerability identified in the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.3.0 up to but not including 9.5.8, and versions from 10.0.0 up to but not including 10.0.2. The flaw resides in the login page, where improper neutralization of special elements in SQL commands allows an attacker to inject malicious SQL code. Notably, exploitation of this vulnerability does not require any user credentials or authentication, making it accessible to unauthenticated remote attackers. This SQL injection could enable attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or even complete compromise of the underlying database. Since the login page is publicly accessible, the attack surface is broad. There are no known workarounds, and users are strongly advised to upgrade to patched versions as soon as possible. Although no known exploits have been reported in the wild, the vulnerability’s presence in a critical component of GLPI’s authentication mechanism poses a significant risk to organizations relying on this software for IT asset and service management.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. GLPI is commonly deployed in public sector institutions, educational organizations, and private enterprises for managing IT assets and service desks. Exploitation could lead to unauthorized access to sensitive IT management data, including asset inventories, license information, and service tickets, potentially exposing confidential operational details. Attackers could also manipulate or delete data, disrupting IT operations and service management workflows. Given that the vulnerability allows unauthenticated access to inject SQL commands, attackers might escalate their privileges or pivot to other internal systems, increasing the risk of broader network compromise. This could result in operational downtime, regulatory compliance violations (especially under GDPR if personal data is involved), and reputational damage. The absence of known exploits currently reduces immediate risk, but the ease of exploitation and critical nature of the affected component make timely remediation essential.
Mitigation Recommendations
Organizations should prioritize upgrading GLPI installations to versions 9.5.8 or later and 10.0.2 or later, where the vulnerability has been addressed. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the login page. Monitoring and logging of login page access should be enhanced to detect anomalous or suspicious input patterns indicative of injection attempts. Restricting access to the GLPI login interface via IP whitelisting or VPN access can reduce exposure. Regular database backups should be maintained to enable recovery in case of data manipulation. Finally, conducting security assessments and penetration testing focused on GLPI deployments can help identify residual risks and verify the effectiveness of mitigation measures.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2022-31061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
AI-Powered Analysis
Technical Analysis
CVE-2022-31061 is a SQL injection vulnerability identified in the GLPI software, an open-source IT asset and service management platform widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability affects GLPI versions from 9.3.0 up to but not including 9.5.8, and versions from 10.0.0 up to but not including 10.0.2. The flaw resides in the login page, where improper neutralization of special elements in SQL commands allows an attacker to inject malicious SQL code. Notably, exploitation of this vulnerability does not require any user credentials or authentication, making it accessible to unauthenticated remote attackers. This SQL injection could enable attackers to manipulate backend database queries, potentially leading to unauthorized data disclosure, data modification, or even complete compromise of the underlying database. Since the login page is publicly accessible, the attack surface is broad. There are no known workarounds, and users are strongly advised to upgrade to patched versions as soon as possible. Although no known exploits have been reported in the wild, the vulnerability’s presence in a critical component of GLPI’s authentication mechanism poses a significant risk to organizations relying on this software for IT asset and service management.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial. GLPI is commonly deployed in public sector institutions, educational organizations, and private enterprises for managing IT assets and service desks. Exploitation could lead to unauthorized access to sensitive IT management data, including asset inventories, license information, and service tickets, potentially exposing confidential operational details. Attackers could also manipulate or delete data, disrupting IT operations and service management workflows. Given that the vulnerability allows unauthenticated access to inject SQL commands, attackers might escalate their privileges or pivot to other internal systems, increasing the risk of broader network compromise. This could result in operational downtime, regulatory compliance violations (especially under GDPR if personal data is involved), and reputational damage. The absence of known exploits currently reduces immediate risk, but the ease of exploitation and critical nature of the affected component make timely remediation essential.
Mitigation Recommendations
Organizations should prioritize upgrading GLPI installations to versions 9.5.8 or later and 10.0.2 or later, where the vulnerability has been addressed. Since no workarounds exist, patching is the primary mitigation. Additionally, organizations should implement network-level protections such as web application firewalls (WAFs) configured to detect and block SQL injection attempts targeting the login page. Monitoring and logging of login page access should be enhanced to detect anomalous or suspicious input patterns indicative of injection attempts. Restricting access to the GLPI login interface via IP whitelisting or VPN access can reduce exposure. Regular database backups should be maintained to enable recovery in case of data manipulation. Finally, conducting security assessments and penetration testing focused on GLPI deployments can help identify residual risks and verify the effectiveness of mitigation measures.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf35ce
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 4:04:55 AM
Last updated: 2/7/2026, 3:31:32 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.