CVE-2022-39373: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.
AI Analysis
Technical Summary
CVE-2022-39373 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.4. Specifically, the flaw arises from improper neutralization of input during web page generation, where an administrator can store malicious code within the entity name field. This malicious input is not adequately sanitized or encoded before being rendered in the web interface, enabling the injection and execution of arbitrary JavaScript code in the context of users viewing the affected pages. Exploiting this vulnerability could allow an attacker with administrative privileges to execute scripts that may hijack user sessions, steal sensitive information, or perform actions on behalf of other users. Although exploitation requires administrative access to inject the malicious payload, the vulnerability poses a risk to the confidentiality and integrity of data managed within GLPI. The issue has been addressed in GLPI version 10.0.4, and users are advised to upgrade to this or later versions to mitigate the risk. There are no known exploits in the wild at this time, but the presence of this vulnerability in an IT management platform used by organizations makes it a potential target for attackers aiming to compromise internal IT infrastructure.
Potential Impact
For European organizations, the impact of CVE-2022-39373 can be significant, especially for those relying on GLPI for managing IT assets, service desks, and software licenses. Successful exploitation could lead to unauthorized script execution within the GLPI web interface, potentially resulting in session hijacking, unauthorized data access, or manipulation of IT asset records. This could disrupt IT service management workflows, compromise sensitive organizational data, and facilitate further lateral movement within the network. Given that GLPI is often used in environments with privileged access to critical IT infrastructure, the vulnerability could indirectly affect the availability and integrity of broader IT services. While exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this vulnerability to escalate attacks. The absence of known active exploits reduces immediate risk, but the medium severity rating indicates a need for timely remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade of GLPI installations to version 10.0.4 or later to apply the official patch addressing this vulnerability. 2. Implement strict access controls and monitoring on administrator accounts to prevent unauthorized access or misuse. 3. Conduct regular audits of entity names and other input fields to detect and remove any suspicious or malicious content. 4. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting GLPI interfaces. 5. Educate administrators and users on safe input handling and the risks of injecting untrusted content. 6. Enable Content Security Policy (CSP) headers on GLPI web servers to restrict the execution of unauthorized scripts. 7. Monitor GLPI logs for unusual activities that could indicate attempted exploitation. 8. Where possible, isolate GLPI servers within segmented network zones to limit the impact of a potential compromise.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2022-39373: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Administrator may store malicious code in entity name. This issue has been patched, please upgrade to version 10.0.4.
AI-Powered Analysis
Technical Analysis
CVE-2022-39373 is a cross-site scripting (XSS) vulnerability classified under CWE-79, affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability exists in versions 10.0.0 up to but not including 10.0.4. Specifically, the flaw arises from improper neutralization of input during web page generation, where an administrator can store malicious code within the entity name field. This malicious input is not adequately sanitized or encoded before being rendered in the web interface, enabling the injection and execution of arbitrary JavaScript code in the context of users viewing the affected pages. Exploiting this vulnerability could allow an attacker with administrative privileges to execute scripts that may hijack user sessions, steal sensitive information, or perform actions on behalf of other users. Although exploitation requires administrative access to inject the malicious payload, the vulnerability poses a risk to the confidentiality and integrity of data managed within GLPI. The issue has been addressed in GLPI version 10.0.4, and users are advised to upgrade to this or later versions to mitigate the risk. There are no known exploits in the wild at this time, but the presence of this vulnerability in an IT management platform used by organizations makes it a potential target for attackers aiming to compromise internal IT infrastructure.
Potential Impact
For European organizations, the impact of CVE-2022-39373 can be significant, especially for those relying on GLPI for managing IT assets, service desks, and software licenses. Successful exploitation could lead to unauthorized script execution within the GLPI web interface, potentially resulting in session hijacking, unauthorized data access, or manipulation of IT asset records. This could disrupt IT service management workflows, compromise sensitive organizational data, and facilitate further lateral movement within the network. Given that GLPI is often used in environments with privileged access to critical IT infrastructure, the vulnerability could indirectly affect the availability and integrity of broader IT services. While exploitation requires administrative privileges, insider threats or compromised administrator accounts could leverage this vulnerability to escalate attacks. The absence of known active exploits reduces immediate risk, but the medium severity rating indicates a need for timely remediation to prevent potential exploitation.
Mitigation Recommendations
1. Immediate upgrade of GLPI installations to version 10.0.4 or later to apply the official patch addressing this vulnerability. 2. Implement strict access controls and monitoring on administrator accounts to prevent unauthorized access or misuse. 3. Conduct regular audits of entity names and other input fields to detect and remove any suspicious or malicious content. 4. Employ web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting GLPI interfaces. 5. Educate administrators and users on safe input handling and the risks of injecting untrusted content. 6. Enable Content Security Policy (CSP) headers on GLPI web servers to restrict the execution of unauthorized scripts. 7. Monitor GLPI logs for unusual activities that could indicate attempted exploitation. 8. Where possible, isolate GLPI servers within segmented network zones to limit the impact of a potential compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf49ae
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:36:10 PM
Last updated: 7/29/2025, 6:22:29 PM
Views: 12
Related Threats
CVE-2025-9010: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9009: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-31961: CWE-1220 Insufficient Granularity of Access Control in HCL Software Connections
LowCVE-2025-9008: SQL Injection in itsourcecode Online Tour and Travel Management System
MediumCVE-2025-9007: Buffer Overflow in Tenda CH22
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.