CVE-2022-39372: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
AI Analysis
Technical Summary
CVE-2022-39372 is a cross-site scripting (XSS) vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions from 0.70 up to but not including 10.0.4. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79) and improper neutralization of script-related HTML tags (CWE-80). Specifically, authenticated users can inject malicious scripts into their account information fields, which are then rendered without proper sanitization. This flaw allows the execution of arbitrary JavaScript in the context of other users' browsers when they view the affected content. Although exploitation requires authentication, the impact includes potential session hijacking, privilege escalation, or unauthorized actions performed on behalf of legitimate users. The vulnerability was publicly disclosed on November 3, 2022, and has been patched in GLPI version 10.0.4. No known exploits have been reported in the wild, and no workarounds exist aside from upgrading. The vulnerability is significant because GLPI is often deployed in enterprise environments managing critical IT infrastructure, making it a valuable target for attackers aiming to compromise internal systems or gain footholds within organizational networks.
Potential Impact
For European organizations, the impact of CVE-2022-39372 can be substantial due to GLPI's role in managing IT assets and service desks. Successful exploitation could lead to unauthorized access to sensitive IT management data, manipulation of service tickets, or disruption of IT operations. Attackers could leverage the XSS vulnerability to steal session cookies, perform actions with the privileges of legitimate users, or deliver further payloads such as malware. This could compromise confidentiality and integrity of IT management processes, potentially leading to broader network compromise. Given the authenticated nature of the exploit, insider threats or compromised user accounts pose a higher risk. The availability impact is moderate but could escalate if attackers disrupt IT service management workflows. European organizations with GLPI deployments in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of the managed data and regulatory requirements around data protection and operational continuity.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade GLPI installations to version 10.0.4 or later, where the vulnerability has been patched. Organizations should prioritize this upgrade in their patch management cycles. Additionally, implement strict access controls and monitoring to limit the number of users with permissions to modify account information fields. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns related to script injection in GLPI interfaces. Conduct regular security awareness training to reduce the risk of credential compromise that could enable authenticated exploitation. Review and harden session management policies to minimize the impact of stolen session tokens. Finally, perform routine security assessments and code reviews for custom plugins or integrations with GLPI to ensure they do not introduce similar vulnerabilities.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland
CVE-2022-39372: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-39372 is a cross-site scripting (XSS) vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions from 0.70 up to but not including 10.0.4. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability arises due to improper neutralization of input during web page generation (CWE-79) and improper neutralization of script-related HTML tags (CWE-80). Specifically, authenticated users can inject malicious scripts into their account information fields, which are then rendered without proper sanitization. This flaw allows the execution of arbitrary JavaScript in the context of other users' browsers when they view the affected content. Although exploitation requires authentication, the impact includes potential session hijacking, privilege escalation, or unauthorized actions performed on behalf of legitimate users. The vulnerability was publicly disclosed on November 3, 2022, and has been patched in GLPI version 10.0.4. No known exploits have been reported in the wild, and no workarounds exist aside from upgrading. The vulnerability is significant because GLPI is often deployed in enterprise environments managing critical IT infrastructure, making it a valuable target for attackers aiming to compromise internal systems or gain footholds within organizational networks.
Potential Impact
For European organizations, the impact of CVE-2022-39372 can be substantial due to GLPI's role in managing IT assets and service desks. Successful exploitation could lead to unauthorized access to sensitive IT management data, manipulation of service tickets, or disruption of IT operations. Attackers could leverage the XSS vulnerability to steal session cookies, perform actions with the privileges of legitimate users, or deliver further payloads such as malware. This could compromise confidentiality and integrity of IT management processes, potentially leading to broader network compromise. Given the authenticated nature of the exploit, insider threats or compromised user accounts pose a higher risk. The availability impact is moderate but could escalate if attackers disrupt IT service management workflows. European organizations with GLPI deployments in sectors such as government, finance, healthcare, and critical infrastructure are particularly at risk due to the sensitive nature of the managed data and regulatory requirements around data protection and operational continuity.
Mitigation Recommendations
The primary and most effective mitigation is to upgrade GLPI installations to version 10.0.4 or later, where the vulnerability has been patched. Organizations should prioritize this upgrade in their patch management cycles. Additionally, implement strict access controls and monitoring to limit the number of users with permissions to modify account information fields. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious input patterns related to script injection in GLPI interfaces. Conduct regular security awareness training to reduce the risk of credential compromise that could enable authenticated exploitation. Review and harden session management policies to minimize the impact of stolen session tokens. Finally, perform routine security assessments and code reviews for custom plugins or integrations with GLPI to ensure they do not introduce similar vulnerabilities.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf49a1
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:36:21 PM
Last updated: 2/7/2026, 5:54:00 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2106: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2105: Improper Authorization in yeqifu warehouse
MediumCVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.