CVE-2022-39373: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.
AI Analysis
Technical Summary
CVE-2022-39373 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.4. Specifically, the flaw arises from improper neutralization of input during web page generation, where an administrator can store malicious code within the entity name field. This malicious input is not adequately sanitized or encoded before being rendered in the web interface, enabling the injection and execution of arbitrary JavaScript code in the context of users viewing the affected pages. Exploiting this vulnerability could allow an attacker with administrative privileges to execute scripts that may hijack user sessions, steal sensitive information, or perform actions on behalf of other users. Although exploitation requires administrative access to inject the malicious payload, the vulnerability poses a risk to the confidentiality and integrity of data managed within GLPI. The issue has been addressed in GLPI version 10.0.4, and users are advised to upgrade to this or later versions to mitigate the risk. There are no known exploits in the wild at this time, but the presence of this vulnerability in an IT management platform used by organizations makes it a potential target for attackers aiming to compromise internal IT infrastructure.
Potential Impact
For European organizations, the impact of CVE-2022-39373 can be significant, especially for those relying on GLPI for managing IT assets, service desks, and software licenses. Successful exploitation could lead to unauthorized script execution within the GLPI web interface, potentially resulting in session hijacking, unauthorized data access, or manipulation of IT asset records. This could disrupt IT service management workflows, compromise sensitive organizational data, and facilitate further lateral movement within the network. Given that GLPI is often used in environments with privileged access to critical IT infrastructure, the vulnerability could indirectly affect the availability and integrity of broader IT services. While exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this vulnerability to escalate attacks. The absence of known active exploits reduces immediate risk, but the medium severity rating indicates a need for timely remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade of GLPI installations to version 10.0.4 or later to apply the official patch addressing this vulnerability. 2. Implement strict access controls and monitoring on administrator accounts to prevent unauthorized access or misuse. 3. Conduct regular audits of entity names and other input fields to detect and remove any suspicious or malicious content. 4. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting GLPI interfaces. 5. Educate administrators and users on safe input handling and the risks of injecting untrusted content. 6. Enable Content Security Policy (CSP) headers on GLPI web servers to restrict the execution of unauthorized scripts. 7. Monitor GLPI logs for unusual activities that could indicate attempted exploitation. 8. Where possible, isolate GLPI servers within segmented network zones to limit the impact of a potential compromise.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2022-39373: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.
AI-Powered Analysis
Technical Analysis
CVE-2022-39373 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.4. Specifically, the flaw arises from improper neutralization of input during web page generation, where an administrator can store malicious code within the entity name field. This malicious input is not adequately sanitized or encoded before being rendered in the web interface, enabling the injection and execution of arbitrary JavaScript code in the context of users viewing the affected pages. Exploiting this vulnerability could allow an attacker with administrative privileges to execute scripts that may hijack user sessions, steal sensitive information, or perform actions on behalf of other users. Although exploitation requires administrative access to inject the malicious payload, the vulnerability poses a risk to the confidentiality and integrity of data managed within GLPI. The issue has been addressed in GLPI version 10.0.4, and users are advised to upgrade to this or later versions to mitigate the risk. There are no known exploits in the wild at this time, but the presence of this vulnerability in an IT management platform used by organizations makes it a potential target for attackers aiming to compromise internal IT infrastructure.
Potential Impact
For European organizations, the impact of CVE-2022-39373 can be significant, especially for those relying on GLPI for managing IT assets, service desks, and software licenses. Successful exploitation could lead to unauthorized script execution within the GLPI web interface, potentially resulting in session hijacking, unauthorized data access, or manipulation of IT asset records. This could disrupt IT service management workflows, compromise sensitive organizational data, and facilitate further lateral movement within the network. Given that GLPI is often used in environments with privileged access to critical IT infrastructure, the vulnerability could indirectly affect the availability and integrity of broader IT services. While exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this vulnerability to escalate attacks. The absence of known active exploits reduces immediate risk, but the medium severity rating indicates a need for timely remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade of GLPI installations to version 10.0.4 or later to apply the official patch addressing this vulnerability. 2. Implement strict access controls and monitoring on administrator accounts to prevent unauthorized access or misuse. 3. Conduct regular audits of entity names and other input fields to detect and remove any suspicious or malicious content. 4. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting GLPI interfaces. 5. Educate administrators and users on safe input handling and the risks of injecting untrusted content. 6. Enable Content Security Policy (CSP) headers on GLPI web servers to restrict the execution of unauthorized scripts. 7. Monitor GLPI logs for unusual activities that could indicate attempted exploitation. 8. Where possible, isolate GLPI servers within segmented network zones to limit the impact of a potential compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf49ae
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:36:10 PM
Last updated: 2/7/2026, 1:33:25 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Organizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.