Skip to main content

CVE-2022-39376: CWE-20: Improper Input Validation in glpi-project glpi

Medium
Published: Thu Nov 03 2022 (11/03/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: glpi-project
Product: glpi

Description

GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Users may be able to inject custom fields values in `mailto` links. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds.

AI-Powered Analysis

AILast updated: 06/22/2025, 14:23:40 UTC

Technical Analysis

CVE-2022-39376 is a medium-severity vulnerability classified under CWE-20, which pertains to improper input validation in the GLPI software, specifically in versions from 0.65 up to but not including 10.0.4. GLPI (Gestionnaire Libre de Parc Informatique) is an open-source IT asset and service management software widely used for ITIL-compliant service desk operations, license tracking, and software auditing. The vulnerability arises from insufficient validation of user-supplied input that can be injected into 'mailto' links within the application. This improper input validation could allow an attacker to manipulate or inject arbitrary values into these mailto links, potentially leading to unintended behaviors such as phishing, social engineering attacks, or redirecting email communications to attacker-controlled addresses. Although no known exploits are currently reported in the wild, the vulnerability's presence in a critical IT management tool could be leveraged by attackers to compromise communication integrity or deceive users. The issue has been addressed in GLPI version 10.0.4, and users are strongly advised to upgrade to this patched version to mitigate the risk. No effective workarounds are currently available, emphasizing the importance of timely patching. The vulnerability does not require user interaction beyond the processing of the crafted input and does not explicitly require authentication, which could increase the attack surface depending on the deployment configuration and exposure of the GLPI instance.

Potential Impact

For European organizations, the impact of CVE-2022-39376 could be significant due to GLPI's role in managing IT assets, service desks, and software licenses—functions critical to operational continuity and security compliance. Exploitation could lead to compromised email communications, enabling phishing campaigns or unauthorized disclosure of sensitive information through manipulated mailto links. This could undermine trust in IT service management processes and potentially facilitate further attacks such as credential theft or lateral movement within networks. Organizations relying heavily on GLPI for ITIL service management may face disruptions in incident response workflows or license compliance tracking, affecting both operational efficiency and regulatory adherence. Given the absence of known exploits, the immediate risk is moderate; however, the potential for social engineering and communication interception elevates the threat in environments where GLPI is externally accessible or integrated with email systems. The vulnerability's exploitation could also impact confidentiality and integrity of communications, although direct impact on system availability is less likely.

Mitigation Recommendations

To mitigate CVE-2022-39376, European organizations should prioritize upgrading all GLPI instances to version 10.0.4 or later, as this patch directly addresses the improper input validation flaw. Network segmentation should be employed to restrict access to GLPI servers, limiting exposure to trusted internal networks or VPNs to reduce the attack surface. Organizations should audit and monitor email-related functionalities within GLPI for anomalous mailto link usage or unexpected email redirections. Implementing strict input validation and sanitization at the application layer, if customization is possible, can provide an additional security layer. Security teams should also educate users about the risks of interacting with suspicious mailto links and reinforce phishing awareness. Regular vulnerability scanning and penetration testing focused on GLPI deployments can help detect any residual or related weaknesses. Finally, logging and alerting mechanisms should be enhanced to detect unusual activities involving email link generation or usage within GLPI.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-09-02T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9846c4522896dcbf49b6

Added to database: 5/21/2025, 9:09:26 AM

Last enriched: 6/22/2025, 2:23:40 PM

Last updated: 8/4/2025, 7:02:20 PM

Views: 16

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats