Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-35946: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

0
Medium
Published: Wed Sep 14 2022 (09/14/2022, 17:55:09 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.

AI-Powered Analysis

AILast updated: 06/22/2025, 22:36:49 UTC

Technical Analysis

CVE-2022-35946 is a medium-severity SQL Injection vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management solution widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in the plugin controller of GLPI versions from 0.72 up to, but not including, 10.0.3. Specifically, the issue arises because user input in requests is not properly sanitized or validated before being used in SQL commands within the plugin controller. This improper neutralization of special elements (CWE-89) allows an attacker with "General setup" update rights to manipulate SQL queries, potentially altering database contents. The attack vector requires authenticated access with elevated privileges, meaning the attacker must already have some level of administrative rights within the GLPI environment. Exploitation could lead to unauthorized modification of critical data stored in the GLPI database, such as asset records, service tickets, or configuration information, undermining data integrity and potentially impacting IT service management operations. No known exploits have been reported in the wild to date. The vendor recommends upgrading to GLPI version 10.0.3 or later to remediate the vulnerability. For users unable to upgrade immediately, a temporary mitigation is to remove the vulnerable script file `front/plugin.form.php` to prevent exploitation through this attack vector.

Potential Impact

For European organizations relying on GLPI for IT asset management and service desk operations, this vulnerability poses a risk to the integrity of critical IT management data. An attacker exploiting this flaw could alter database records, potentially disrupting IT service workflows, misrepresenting asset inventories, or corrupting license tracking data. This could lead to operational inefficiencies, compliance issues, and increased risk of further security incidents due to inaccurate IT environment visibility. Since exploitation requires authenticated access with elevated privileges, the threat is primarily from insider threats or attackers who have already compromised lower-level accounts. However, if such access is obtained, the impact on confidentiality is limited but the integrity and availability of IT management data could be significantly affected. This may also indirectly affect business continuity and regulatory compliance, especially in sectors with strict IT governance requirements such as finance, healthcare, and critical infrastructure within Europe.

Mitigation Recommendations

1. Immediate upgrade to GLPI version 10.0.3 or later, which contains the fix for this vulnerability, is the most effective mitigation. 2. For organizations unable to upgrade promptly, remove or restrict access to the `front/plugin.form.php` script to block the vulnerable entry point. 3. Review and tighten user permissions to ensure that only trusted administrators have "General setup" update rights, minimizing the risk of privilege abuse. 4. Implement strong authentication mechanisms and monitor administrative account activities for unusual behavior indicative of compromise. 5. Conduct regular audits of GLPI database integrity and logs to detect unauthorized changes early. 6. Employ network segmentation and access controls to limit exposure of GLPI management interfaces to trusted internal networks only. 7. Maintain up-to-date backups of GLPI data to enable recovery in case of data corruption or tampering. 8. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting GLPI plugin endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-07-15T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9844c4522896dcbf3d26

Added to database: 5/21/2025, 9:09:24 AM

Last enriched: 6/22/2025, 10:36:49 PM

Last updated: 2/7/2026, 9:34:45 AM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats