CVE-2022-31068: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.
AI Analysis
Technical Summary
CVE-2022-31068 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management solution widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2. It arises from an unauthenticated feature related to retrieving refused files within the native inventory component of GLPI. Specifically, this feature allows unauthorized actors to access sensitive information without authentication, resulting in an exposure of sensitive data (classified under CWE-200: Exposure of Sensitive Information to an Unauthorized Actor). The flaw essentially permits attackers to bypass access controls and obtain potentially confidential data stored or managed by GLPI instances. Although no known exploits have been reported in the wild, the vulnerability was publicly disclosed on June 28, 2022, and has been addressed in GLPI version 10.0.2. Organizations running affected versions are strongly advised to upgrade to the patched release to mitigate the risk. The vulnerability impacts the confidentiality of sensitive information but does not directly affect system integrity or availability. Exploitation does not require authentication or user interaction, increasing the risk profile for exposed systems. Given GLPI’s role in managing critical IT assets and service operations, unauthorized data exposure could lead to further targeted attacks or data leakage.
Potential Impact
For European organizations, the exposure of sensitive information through this vulnerability could have significant operational and compliance repercussions. GLPI is commonly used by public sector entities, educational institutions, and private enterprises for IT asset management and service desk operations. Unauthorized access to sensitive inventory or service data could reveal internal infrastructure details, license information, or operational workflows, potentially aiding attackers in crafting more sophisticated attacks or causing reputational damage. Additionally, exposure of sensitive data may lead to violations of data protection regulations such as the GDPR, resulting in legal and financial penalties. The impact is particularly critical for organizations managing large-scale IT environments or those with stringent compliance requirements. While the vulnerability does not directly compromise system availability or integrity, the confidentiality breach alone can undermine trust and security posture. The lack of authentication requirement for exploitation increases the risk of automated scanning and mass exploitation attempts, especially if GLPI instances are internet-facing or insufficiently segmented within internal networks.
Mitigation Recommendations
Beyond the essential step of upgrading all affected GLPI instances to version 10.0.2 or later, European organizations should implement several targeted mitigations: 1) Conduct a comprehensive inventory to identify all GLPI deployments, including those in development, testing, and production environments, to ensure no vulnerable instances remain. 2) Restrict network access to GLPI interfaces, especially the native inventory features, by implementing network segmentation, firewall rules, and VPN access controls to limit exposure to trusted users only. 3) Enable and review detailed logging on GLPI servers to detect unusual access patterns or attempts to exploit the unauthenticated file retrieval feature. 4) Perform regular security assessments and penetration tests focusing on GLPI components to identify residual risks or misconfigurations. 5) Educate IT and security teams about this vulnerability and the importance of timely patching and monitoring. 6) If immediate patching is not feasible, consider temporarily disabling or restricting the vulnerable native inventory feature or applying web application firewall (WAF) rules to block unauthorized access to the affected endpoints. 7) Review and tighten access control policies around sensitive IT asset data to minimize the impact of any potential data exposure.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2022-31068: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions all GLPI instances with the native inventory used may leak sensitive information. The feature to get refused file is not authenticated. This issue has been addressed in version 10.0.2 and all affected users are advised to upgrade.
AI-Powered Analysis
Technical Analysis
CVE-2022-31068 is a medium-severity vulnerability affecting the GLPI software, an open-source IT asset and service management solution widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.2. It arises from an unauthenticated feature related to retrieving refused files within the native inventory component of GLPI. Specifically, this feature allows unauthorized actors to access sensitive information without authentication, resulting in an exposure of sensitive data (classified under CWE-200: Exposure of Sensitive Information to an Unauthorized Actor). The flaw essentially permits attackers to bypass access controls and obtain potentially confidential data stored or managed by GLPI instances. Although no known exploits have been reported in the wild, the vulnerability was publicly disclosed on June 28, 2022, and has been addressed in GLPI version 10.0.2. Organizations running affected versions are strongly advised to upgrade to the patched release to mitigate the risk. The vulnerability impacts the confidentiality of sensitive information but does not directly affect system integrity or availability. Exploitation does not require authentication or user interaction, increasing the risk profile for exposed systems. Given GLPI’s role in managing critical IT assets and service operations, unauthorized data exposure could lead to further targeted attacks or data leakage.
Potential Impact
For European organizations, the exposure of sensitive information through this vulnerability could have significant operational and compliance repercussions. GLPI is commonly used by public sector entities, educational institutions, and private enterprises for IT asset management and service desk operations. Unauthorized access to sensitive inventory or service data could reveal internal infrastructure details, license information, or operational workflows, potentially aiding attackers in crafting more sophisticated attacks or causing reputational damage. Additionally, exposure of sensitive data may lead to violations of data protection regulations such as the GDPR, resulting in legal and financial penalties. The impact is particularly critical for organizations managing large-scale IT environments or those with stringent compliance requirements. While the vulnerability does not directly compromise system availability or integrity, the confidentiality breach alone can undermine trust and security posture. The lack of authentication requirement for exploitation increases the risk of automated scanning and mass exploitation attempts, especially if GLPI instances are internet-facing or insufficiently segmented within internal networks.
Mitigation Recommendations
Beyond the essential step of upgrading all affected GLPI instances to version 10.0.2 or later, European organizations should implement several targeted mitigations: 1) Conduct a comprehensive inventory to identify all GLPI deployments, including those in development, testing, and production environments, to ensure no vulnerable instances remain. 2) Restrict network access to GLPI interfaces, especially the native inventory features, by implementing network segmentation, firewall rules, and VPN access controls to limit exposure to trusted users only. 3) Enable and review detailed logging on GLPI servers to detect unusual access patterns or attempts to exploit the unauthenticated file retrieval feature. 4) Perform regular security assessments and penetration tests focusing on GLPI components to identify residual risks or misconfigurations. 5) Educate IT and security teams about this vulnerability and the importance of timely patching and monitoring. 6) If immediate patching is not feasible, consider temporarily disabling or restricting the vulnerable native inventory feature or applying web application firewall (WAF) rules to block unauthorized access to the affected endpoints. 7) Review and tighten access control policies around sensitive IT asset data to minimize the impact of any potential data exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf35e4
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/23/2025, 3:51:25 AM
Last updated: 8/6/2025, 1:07:54 PM
Views: 13
Related Threats
CVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumCVE-2025-8418: CWE-862 Missing Authorization in bplugins B Slider- Gutenberg Slider Block for WP
HighCVE-2025-47444: CWE-201 Insertion of Sensitive Information Into Sent Data in Liquid Web GiveWP
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.