CVE-2022-31187: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search.
AI Analysis
Technical Summary
CVE-2022-31187 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, specifically versions from 10.0.0 up to but not including 10.0.3. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability arises due to improper neutralization of HTML tags in the global search context, meaning that user-supplied input is not correctly sanitized before being rendered on web pages. This flaw allows an attacker to inject malicious scripts into the search results page, which can then be executed in the context of other users’ browsers. Exploitation does not require authentication, as the global search feature is typically accessible to users of the system. The vulnerability was publicly disclosed on September 14, 2022, and users are advised to upgrade to GLPI version 10.0.3, where the issue has been fixed. For those unable to upgrade immediately, disabling the global search feature is recommended as a temporary mitigation. There are no known exploits in the wild at this time, but the nature of XSS vulnerabilities means that exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users.
Potential Impact
For European organizations using GLPI versions prior to 10.0.3, this vulnerability poses a moderate risk to confidentiality and integrity. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of authenticated users, potentially leading to theft of session cookies, user credentials, or the injection of malicious content. This could compromise sensitive IT asset management data, disrupt service desk operations, or facilitate further lateral movement within the network. While the vulnerability does not directly impact system availability, the indirect consequences of compromised user accounts or data integrity could lead to operational disruptions. Given GLPI’s role in managing IT infrastructure and licenses, exploitation could also affect compliance and auditing processes. The risk is heightened in environments where GLPI is accessible over the internet or within large organizations with many users having access to the global search feature.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.3 or later, where the vulnerability is patched, is the most effective mitigation. 2. If upgrading is not immediately feasible, disable the global search feature to prevent exploitation of the vulnerable input handling. 3. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the global search functionality. 4. Conduct user awareness training to recognize phishing or social engineering attempts that might leverage this vulnerability. 5. Review and restrict user permissions to limit access to the global search feature only to trusted users. 6. Monitor GLPI logs for unusual search queries or anomalous user activity that could indicate attempted exploitation. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting the execution of unauthorized scripts.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2022-31187: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions were found to not properly neutralize HTML tags in the global search context. Users are advised to upgrade to version 10.0.3 to resolve this issue. Users unable to upgrade should disable global search.
AI-Powered Analysis
Technical Analysis
CVE-2022-31187 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, specifically versions from 10.0.0 up to but not including 10.0.3. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability arises due to improper neutralization of HTML tags in the global search context, meaning that user-supplied input is not correctly sanitized before being rendered on web pages. This flaw allows an attacker to inject malicious scripts into the search results page, which can then be executed in the context of other users’ browsers. Exploitation does not require authentication, as the global search feature is typically accessible to users of the system. The vulnerability was publicly disclosed on September 14, 2022, and users are advised to upgrade to GLPI version 10.0.3, where the issue has been fixed. For those unable to upgrade immediately, disabling the global search feature is recommended as a temporary mitigation. There are no known exploits in the wild at this time, but the nature of XSS vulnerabilities means that exploitation could lead to session hijacking, credential theft, or unauthorized actions performed on behalf of legitimate users.
Potential Impact
For European organizations using GLPI versions prior to 10.0.3, this vulnerability poses a moderate risk to confidentiality and integrity. Successful exploitation could allow attackers to execute arbitrary JavaScript in the context of authenticated users, potentially leading to theft of session cookies, user credentials, or the injection of malicious content. This could compromise sensitive IT asset management data, disrupt service desk operations, or facilitate further lateral movement within the network. While the vulnerability does not directly impact system availability, the indirect consequences of compromised user accounts or data integrity could lead to operational disruptions. Given GLPI’s role in managing IT infrastructure and licenses, exploitation could also affect compliance and auditing processes. The risk is heightened in environments where GLPI is accessible over the internet or within large organizations with many users having access to the global search feature.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.3 or later, where the vulnerability is patched, is the most effective mitigation. 2. If upgrading is not immediately feasible, disable the global search feature to prevent exploitation of the vulnerable input handling. 3. Implement web application firewall (WAF) rules to detect and block suspicious input patterns targeting the global search functionality. 4. Conduct user awareness training to recognize phishing or social engineering attempts that might leverage this vulnerability. 5. Review and restrict user permissions to limit access to the global search feature only to trusted users. 6. Monitor GLPI logs for unusual search queries or anomalous user activity that could indicate attempted exploitation. 7. Employ Content Security Policy (CSP) headers to reduce the impact of potential XSS attacks by restricting the execution of unauthorized scripts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-05-18T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9844c4522896dcbf3d0e
Added to database: 5/21/2025, 9:09:24 AM
Last enriched: 6/22/2025, 10:50:12 PM
Last updated: 8/15/2025, 11:49:30 AM
Views: 18
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.