CVE-2022-39376: CWE-20: Improper Input Validation in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
AI Analysis
Technical Summary
CVE-2022-39376 is a medium-severity vulnerability classified under CWE-20, which pertains to improper input validation in the GLPI software, specifically in versions from 0.65 up to but not including 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL-compliant service desk operations, license tracking, and software auditing. The vulnerability arises from insufficient validation of user-supplied input that can be injected into 'mailto' links within the application. This improper input validation could allow an attacker to manipulate or inject arbitrary values into these mailto links, potentially leading to unintended behaviors such as phishing, social engineering attacks, or redirecting email communications to attacker-controlled addresses. Although no known exploits are currently reported in the wild, the vulnerability's presence in a critical IT management tool could be leveraged by attackers to compromise communication integrity or deceive users. The issue has been addressed in GLPI version 10.0.4, and users are strongly advised to upgrade to this patched version to mitigate the risk. No effective workarounds are currently available, emphasizing the importance of timely patching. The vulnerability does not require user interaction beyond the processing of the crafted input and does not explicitly require authentication, which could increase the attack surface depending on the deployment configuration and exposure of the GLPI instance.
Potential Impact
For European organizations, the impact of CVE-2022-39376 could be significant due to GLPI's role in managing IT assets, service desks, and software licenses—functions critical to operational continuity and security compliance. Exploitation could lead to compromised email communications, enabling phishing campaigns or unauthorized disclosure of sensitive information through manipulated mailto links. This could undermine trust in IT service management processes and potentially facilitate further attacks such as credential theft or lateral movement within networks. Organizations relying heavily on GLPI for ITIL service management may face disruptions in incident response workflows or license compliance tracking, affecting both operational efficiency and regulatory adherence. Given the absence of known exploits, the immediate risk is moderate; however, the potential for social engineering and communication interception elevates the threat in environments where GLPI is externally accessible or integrated with email systems. The vulnerability's exploitation could also impact confidentiality and integrity of communications, although direct impact on system availability is less likely.
Mitigation Recommendations
To mitigate CVE-2022-39376, European organizations should prioritize upgrading all GLPI instances to version 10.0.4 or later, as this patch directly addresses the improper input validation flaw. Network segmentation should be employed to restrict access to GLPI servers, limiting exposure to trusted internal networks or VPNs to reduce the attack surface. Organizations should audit and monitor email-related functionalities within GLPI for anomalous mailto link usage or unexpected email redirections. Implementing strict input validation and sanitization at the application layer, if customization is possible, can provide an additional security layer. Security teams should also educate users about the risks of interacting with suspicious mailto links and reinforce phishing awareness. Regular vulnerability scanning and penetration testing focused on GLPI deployments can help detect any residual or related weaknesses. Finally, logging and alerting mechanisms should be enhanced to detect unusual activities involving email link generation or usage within GLPI.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2022-39376: CWE-20: Improper Input Validation in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2022-39376 is a medium-severity vulnerability classified under CWE-20, which pertains to improper input validation in the GLPI software, specifically in versions from 0.65 up to but not including 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL-compliant service desk operations, license tracking, and software auditing. The vulnerability arises from insufficient validation of user-supplied input that can be injected into 'mailto' links within the application. This improper input validation could allow an attacker to manipulate or inject arbitrary values into these mailto links, potentially leading to unintended behaviors such as phishing, social engineering attacks, or redirecting email communications to attacker-controlled addresses. Although no known exploits are currently reported in the wild, the vulnerability's presence in a critical IT management tool could be leveraged by attackers to compromise communication integrity or deceive users. The issue has been addressed in GLPI version 10.0.4, and users are strongly advised to upgrade to this patched version to mitigate the risk. No effective workarounds are currently available, emphasizing the importance of timely patching. The vulnerability does not require user interaction beyond the processing of the crafted input and does not explicitly require authentication, which could increase the attack surface depending on the deployment configuration and exposure of the GLPI instance.
Potential Impact
For European organizations, the impact of CVE-2022-39376 could be significant due to GLPI's role in managing IT assets, service desks, and software licenses—functions critical to operational continuity and security compliance. Exploitation could lead to compromised email communications, enabling phishing campaigns or unauthorized disclosure of sensitive information through manipulated mailto links. This could undermine trust in IT service management processes and potentially facilitate further attacks such as credential theft or lateral movement within networks. Organizations relying heavily on GLPI for ITIL service management may face disruptions in incident response workflows or license compliance tracking, affecting both operational efficiency and regulatory adherence. Given the absence of known exploits, the immediate risk is moderate; however, the potential for social engineering and communication interception elevates the threat in environments where GLPI is externally accessible or integrated with email systems. The vulnerability's exploitation could also impact confidentiality and integrity of communications, although direct impact on system availability is less likely.
Mitigation Recommendations
To mitigate CVE-2022-39376, European organizations should prioritize upgrading all GLPI instances to version 10.0.4 or later, as this patch directly addresses the improper input validation flaw. Network segmentation should be employed to restrict access to GLPI servers, limiting exposure to trusted internal networks or VPNs to reduce the attack surface. Organizations should audit and monitor email-related functionalities within GLPI for anomalous mailto link usage or unexpected email redirections. Implementing strict input validation and sanitization at the application layer, if customization is possible, can provide an additional security layer. Security teams should also educate users about the risks of interacting with suspicious mailto links and reinforce phishing awareness. Regular vulnerability scanning and penetration testing focused on GLPI deployments can help detect any residual or related weaknesses. Finally, logging and alerting mechanisms should be enhanced to detect unusual activities involving email link generation or usage within GLPI.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2022-09-02T00:00:00.000Z
- Cisa Enriched
- true
Threat ID: 682d9846c4522896dcbf49b6
Added to database: 5/21/2025, 9:09:26 AM
Last enriched: 6/22/2025, 2:23:40 PM
Last updated: 8/4/2025, 7:02:20 PM
Views: 16
Related Threats
CVE-2025-9099: Unrestricted Upload in Acrel Environmental Monitoring Cloud Platform
MediumCVE-2025-9098: Improper Export of Android Application Components in Elseplus File Recovery App
MediumCVE-2025-31715: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
CriticalCVE-2025-31714: CWE-20 Improper Input Validation in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
MediumCVE-2025-31713: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Unisoc (Shanghai) Technologies Co., Ltd. SL8521E/SL8521ET/ SL8541E/UIS8141E/UWS6137/UWS6137E/UWS6151(E)/UWS6152
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.