CVE-2025-27514: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in glpi-project glpi
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In versions 9.5.0 through 10.0.18, a technician can use a malicious payload to trigger a stored XSS on the project's kanban. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-27514 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the GLPI software, versions 9.5.0 through 10.0.18. GLPI is an open-source IT asset and service management platform widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80 and CWE-79) in the project kanban feature, which allows a technician-level user to inject malicious scripts that are persistently stored and later executed in the context of other users viewing the kanban board. The CVSS 3.1 base score is 4.5, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The impact is primarily on confidentiality, as the vulnerability allows an attacker to execute scripts that could steal session tokens or sensitive information from other users. Integrity and availability impacts are not indicated. The vulnerability was fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The flaw specifically affects authenticated users with technician privileges who can inject malicious payloads into the kanban project interface, which then execute when other users access the affected page. This vulnerability underscores the importance of proper input validation and output encoding in web applications, especially in collaborative tools where stored XSS can lead to widespread compromise.
Potential Impact
For European organizations using GLPI for IT asset and service management, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized data exposure via stored XSS attacks. Since the vulnerability requires a technician-level user to inject the payload, insider threats or compromised technician accounts could be leveraged by attackers. The confidentiality of sensitive IT management data, including asset inventories, license information, and service desk tickets, could be compromised. This could lead to further lateral movement within the organization or data leakage. Given GLPI's role in managing critical IT infrastructure, exploitation could undermine trust in IT operations and potentially disrupt service management workflows. The lack of impact on integrity and availability reduces the risk of direct service disruption but does not eliminate the risk of indirect operational impacts due to compromised credentials or data exposure. European organizations with strict data protection regulations (e.g., GDPR) must consider the compliance implications of such data breaches.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.19 or later, where the vulnerability is patched, is the most effective mitigation. 2. Restrict technician-level privileges to trusted personnel only and enforce strong authentication and monitoring of these accounts to reduce the risk of insider threats or account compromise. 3. Implement web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting GLPI interfaces. 4. Conduct regular security audits and code reviews focusing on input validation and output encoding in custom plugins or integrations with GLPI. 5. Educate users, especially technicians, about the risks of injecting untrusted content and the importance of secure coding practices. 6. Monitor GLPI logs for unusual activity related to project kanban modifications or unexpected script injections. 7. If immediate upgrade is not feasible, consider disabling or restricting access to the project kanban feature temporarily to limit exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Austria
CVE-2025-27514: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In versions 9.5.0 through 10.0.18, a technician can use a malicious payload to trigger a stored XSS on the project's kanban. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-27514 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the GLPI software, versions 9.5.0 through 10.0.18. GLPI is an open-source IT asset and service management platform widely used for data center management, ITIL service desks, license tracking, and software auditing. The vulnerability arises from improper neutralization of script-related HTML tags (CWE-80 and CWE-79) in the project kanban feature, which allows a technician-level user to inject malicious scripts that are persistently stored and later executed in the context of other users viewing the kanban board. The CVSS 3.1 base score is 4.5, reflecting a medium severity with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The impact is primarily on confidentiality, as the vulnerability allows an attacker to execute scripts that could steal session tokens or sensitive information from other users. Integrity and availability impacts are not indicated. The vulnerability was fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The flaw specifically affects authenticated users with technician privileges who can inject malicious payloads into the kanban project interface, which then execute when other users access the affected page. This vulnerability underscores the importance of proper input validation and output encoding in web applications, especially in collaborative tools where stored XSS can lead to widespread compromise.
Potential Impact
For European organizations using GLPI for IT asset and service management, this vulnerability poses a risk of session hijacking, credential theft, or unauthorized data exposure via stored XSS attacks. Since the vulnerability requires a technician-level user to inject the payload, insider threats or compromised technician accounts could be leveraged by attackers. The confidentiality of sensitive IT management data, including asset inventories, license information, and service desk tickets, could be compromised. This could lead to further lateral movement within the organization or data leakage. Given GLPI's role in managing critical IT infrastructure, exploitation could undermine trust in IT operations and potentially disrupt service management workflows. The lack of impact on integrity and availability reduces the risk of direct service disruption but does not eliminate the risk of indirect operational impacts due to compromised credentials or data exposure. European organizations with strict data protection regulations (e.g., GDPR) must consider the compliance implications of such data breaches.
Mitigation Recommendations
1. Immediate upgrade to GLPI version 10.0.19 or later, where the vulnerability is patched, is the most effective mitigation. 2. Restrict technician-level privileges to trusted personnel only and enforce strong authentication and monitoring of these accounts to reduce the risk of insider threats or account compromise. 3. Implement web application firewalls (WAFs) with rules to detect and block common XSS payloads targeting GLPI interfaces. 4. Conduct regular security audits and code reviews focusing on input validation and output encoding in custom plugins or integrations with GLPI. 5. Educate users, especially technicians, about the risks of injecting untrusted content and the importance of secure coding practices. 6. Monitor GLPI logs for unusual activity related to project kanban modifications or unexpected script injections. 7. If immediate upgrade is not feasible, consider disabling or restricting access to the project kanban feature temporarily to limit exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-02-26T18:11:52.306Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68890940ad5a09ad008f4e02
Added to database: 7/29/2025, 5:47:44 PM
Last enriched: 7/29/2025, 6:03:14 PM
Last updated: 10/30/2025, 2:17:30 PM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell Unity
HighX-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.