CVE-2025-52897: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in glpi-project glpi
GLPI is a Free Asset and IT Management Software package. In versions 9.1.0 through 10.0.18, an unauthenticated user can send a malicious link to attempt a phishing attack from the planning feature. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-52897 is a medium-severity vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions 9.1.0 through 10.0.18. GLPI is a widely used free and open-source IT asset and management software. The vulnerability is classified under CWE-80, indicating improper neutralization of script-related HTML tags, commonly known as Cross-Site Scripting (XSS). Specifically, this vulnerability allows an unauthenticated attacker to craft and send malicious links via the planning feature of GLPI, which can be used to conduct phishing attacks. When a victim clicks on such a malicious link, the embedded script executes in the victim's browser context, potentially leading to the theft of sensitive information such as session cookies or credentials. The vulnerability requires no authentication (AV:N, PR:N) but does require user interaction (UI:R) since the victim must click the malicious link. The impact on confidentiality is high (C:H), while integrity and availability are not affected (I:N, A:N). The vulnerability is fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The vulnerability also relates to CWE-601, which involves open redirect issues, possibly indicating that the malicious link could leverage redirect mechanisms to facilitate phishing. Given the nature of GLPI as an IT asset management tool, exploitation could lead to targeted phishing campaigns against IT staff or administrators, potentially enabling further compromise through social engineering.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on GLPI for IT asset and service management. Successful exploitation could lead to credential theft or session hijacking of IT personnel, which in turn could facilitate unauthorized access to internal systems or sensitive data. This is particularly critical in sectors with stringent data protection requirements such as finance, healthcare, and government institutions. The phishing vector could also be used to distribute malware or conduct further social engineering attacks within the organization. Since GLPI is often used to manage IT infrastructure, compromise of GLPI users could undermine the integrity of IT operations and incident response capabilities. The vulnerability's unauthenticated nature increases the risk as attackers do not need prior access to the system. Although no active exploits are reported, the medium CVSS score and the ease of crafting phishing links warrant proactive mitigation to prevent potential targeted attacks.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 10.0.19 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and output encoding on the planning feature to neutralize script tags and prevent XSS payloads. Additionally, deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious script injections or phishing URLs targeting GLPI can reduce risk. User awareness training focused on recognizing phishing attempts, especially those involving internal IT tools, is critical. Organizations should also monitor logs for unusual access patterns or phishing link distributions related to GLPI. Network segmentation can limit the impact if a compromise occurs. Finally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-52897: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package. In versions 9.1.0 through 10.0.18, an unauthenticated user can send a malicious link to attempt a phishing attack from the planning feature. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-52897 is a medium-severity vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions 9.1.0 through 10.0.18. GLPI is a widely used free and open-source IT asset and management software. The vulnerability is classified under CWE-80, indicating improper neutralization of script-related HTML tags, commonly known as Cross-Site Scripting (XSS). Specifically, this vulnerability allows an unauthenticated attacker to craft and send malicious links via the planning feature of GLPI, which can be used to conduct phishing attacks. When a victim clicks on such a malicious link, the embedded script executes in the victim's browser context, potentially leading to the theft of sensitive information such as session cookies or credentials. The vulnerability requires no authentication (AV:N, PR:N) but does require user interaction (UI:R) since the victim must click the malicious link. The impact on confidentiality is high (C:H), while integrity and availability are not affected (I:N, A:N). The vulnerability is fixed in GLPI version 10.0.19. No known exploits are currently reported in the wild. The vulnerability also relates to CWE-601, which involves open redirect issues, possibly indicating that the malicious link could leverage redirect mechanisms to facilitate phishing. Given the nature of GLPI as an IT asset management tool, exploitation could lead to targeted phishing campaigns against IT staff or administrators, potentially enabling further compromise through social engineering.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on GLPI for IT asset and service management. Successful exploitation could lead to credential theft or session hijacking of IT personnel, which in turn could facilitate unauthorized access to internal systems or sensitive data. This is particularly critical in sectors with stringent data protection requirements such as finance, healthcare, and government institutions. The phishing vector could also be used to distribute malware or conduct further social engineering attacks within the organization. Since GLPI is often used to manage IT infrastructure, compromise of GLPI users could undermine the integrity of IT operations and incident response capabilities. The vulnerability's unauthenticated nature increases the risk as attackers do not need prior access to the system. Although no active exploits are reported, the medium CVSS score and the ease of crafting phishing links warrant proactive mitigation to prevent potential targeted attacks.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 10.0.19 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict input validation and output encoding on the planning feature to neutralize script tags and prevent XSS payloads. Additionally, deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious script injections or phishing URLs targeting GLPI can reduce risk. User awareness training focused on recognizing phishing attempts, especially those involving internal IT tools, is critical. Organizations should also monitor logs for unusual access patterns or phishing link distributions related to GLPI. Network segmentation can limit the impact if a compromise occurs. Finally, applying Content Security Policy (CSP) headers can help mitigate the impact of XSS by restricting the execution of unauthorized scripts in browsers.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-20T17:42:25.710Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2991ad5a09ad00a671af
Added to database: 7/30/2025, 2:17:53 PM
Last enriched: 7/30/2025, 2:33:02 PM
Last updated: 7/31/2025, 6:23:44 AM
Views: 3
Related Threats
CVE-2025-8213: CWE-36 Absolute Path Traversal in nintechnet NinjaScanner – Virus & Malware scan
HighCVE-2025-8382: SQL Injection in Campcodes Online Hotel Reservation System
MediumCVE-2025-8381: SQL Injection in Campcodes Online Hotel Reservation System
MediumCVE-2025-8401: CWE-285 Improper Authorization in devitemsllc HT Mega – Absolute Addons For Elementor
MediumCVE-2025-8151: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in devitemsllc HT Mega – Absolute Addons For Elementor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.