CVE-2025-53008: CWE-522: Insufficiently Protected Credentials in glpi-project glpi
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 9.3.1 through 10.0.19, a connected user can use a malicious payload to steal mail receiver credentials. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53008 is a medium-severity vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions from 9.3.1 up to but not including 10.0.19. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability is categorized under CWE-522, which refers to insufficiently protected credentials. Specifically, a connected user with legitimate access to the GLPI system can exploit this vulnerability by injecting a malicious payload that enables the theft of mail receiver credentials stored or used by the application. This credential exposure can lead to unauthorized access to sensitive email accounts or services integrated with GLPI. The vulnerability does not require user interaction beyond the attacker being an authenticated user, and it can be exploited remotely over the network (CVSS vector AV:N). The attack complexity is low (AC:L), and no user interaction is needed (UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The issue was addressed and fixed in GLPI version 10.0.19. No known exploits are reported in the wild as of the publication date. The vulnerability’s medium severity score of 6.5 reflects the moderate risk posed by an insider or authenticated attacker who can leverage this flaw to compromise email credentials, potentially leading to further lateral movement or data exfiltration within an organization.
Potential Impact
For European organizations using GLPI versions between 9.3.1 and 10.0.19, this vulnerability poses a significant risk to the confidentiality of email credentials. Since GLPI is often used in IT service management, compromised mail credentials could allow attackers to intercept sensitive communications, reset passwords, or escalate privileges through email-based workflows. This could lead to data breaches, unauthorized access to internal systems, or disruption of IT service management processes. The impact is particularly critical for organizations handling sensitive or regulated data, such as those in finance, healthcare, or government sectors within Europe, where data protection regulations like GDPR impose strict requirements on data confidentiality. The vulnerability’s requirement for authenticated access limits exposure to insider threats or attackers who have already compromised user credentials, but it still represents a serious risk if access controls or monitoring are insufficient. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks, especially as threat actors often develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading GLPI installations to version 10.0.19 or later, where this vulnerability is fixed. Until the upgrade is applied, organizations should enforce strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions to reduce the risk of credential theft by insiders or compromised accounts. Implement multi-factor authentication (MFA) for GLPI access to mitigate the risk of credential compromise leading to exploitation. Regularly audit and monitor logs for unusual activity related to mail credential access or injection attempts. Additionally, segregate GLPI systems from critical email infrastructure where possible, and ensure that mail credentials stored or used by GLPI are encrypted and rotated regularly. Organizations should also educate users about the risks of credential theft and encourage prompt reporting of suspicious behavior. Finally, consider implementing network segmentation and intrusion detection systems to detect and prevent exploitation attempts targeting GLPI.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-53008: CWE-522: Insufficiently Protected Credentials in glpi-project glpi
Description
GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 9.3.1 through 10.0.19, a connected user can use a malicious payload to steal mail receiver credentials. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53008 is a medium-severity vulnerability affecting the GLPI (Gestionnaire Libre de Parc Informatique) software, versions from 9.3.1 up to but not including 10.0.19. GLPI is an open-source IT asset and service management tool widely used for ITIL service desk functions, license tracking, and software auditing. The vulnerability is categorized under CWE-522, which refers to insufficiently protected credentials. Specifically, a connected user with legitimate access to the GLPI system can exploit this vulnerability by injecting a malicious payload that enables the theft of mail receiver credentials stored or used by the application. This credential exposure can lead to unauthorized access to sensitive email accounts or services integrated with GLPI. The vulnerability does not require user interaction beyond the attacker being an authenticated user, and it can be exploited remotely over the network (CVSS vector AV:N). The attack complexity is low (AC:L), and no user interaction is needed (UI:N). The vulnerability impacts confidentiality (C:H) but does not affect integrity or availability. The issue was addressed and fixed in GLPI version 10.0.19. No known exploits are reported in the wild as of the publication date. The vulnerability’s medium severity score of 6.5 reflects the moderate risk posed by an insider or authenticated attacker who can leverage this flaw to compromise email credentials, potentially leading to further lateral movement or data exfiltration within an organization.
Potential Impact
For European organizations using GLPI versions between 9.3.1 and 10.0.19, this vulnerability poses a significant risk to the confidentiality of email credentials. Since GLPI is often used in IT service management, compromised mail credentials could allow attackers to intercept sensitive communications, reset passwords, or escalate privileges through email-based workflows. This could lead to data breaches, unauthorized access to internal systems, or disruption of IT service management processes. The impact is particularly critical for organizations handling sensitive or regulated data, such as those in finance, healthcare, or government sectors within Europe, where data protection regulations like GDPR impose strict requirements on data confidentiality. The vulnerability’s requirement for authenticated access limits exposure to insider threats or attackers who have already compromised user credentials, but it still represents a serious risk if access controls or monitoring are insufficient. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for targeted attacks, especially as threat actors often develop exploits following public disclosure.
Mitigation Recommendations
European organizations should prioritize upgrading GLPI installations to version 10.0.19 or later, where this vulnerability is fixed. Until the upgrade is applied, organizations should enforce strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions to reduce the risk of credential theft by insiders or compromised accounts. Implement multi-factor authentication (MFA) for GLPI access to mitigate the risk of credential compromise leading to exploitation. Regularly audit and monitor logs for unusual activity related to mail credential access or injection attempts. Additionally, segregate GLPI systems from critical email infrastructure where possible, and ensure that mail credentials stored or used by GLPI are encrypted and rotated regularly. Organizations should also educate users about the risks of credential theft and encourage prompt reporting of suspicious behavior. Finally, consider implementing network segmentation and intrusion detection systems to detect and prevent exploitation attempts targeting GLPI.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-24T03:50:36.795Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2991ad5a09ad00a671b2
Added to database: 7/30/2025, 2:17:53 PM
Last enriched: 7/30/2025, 2:32:53 PM
Last updated: 7/31/2025, 11:18:26 AM
Views: 7
Related Threats
CVE-2025-8213: CWE-36 Absolute Path Traversal in nintechnet NinjaScanner – Virus & Malware scan
HighCVE-2025-8382: SQL Injection in Campcodes Online Hotel Reservation System
MediumCVE-2025-8381: SQL Injection in Campcodes Online Hotel Reservation System
MediumCVE-2025-8401: CWE-285 Improper Authorization in devitemsllc HT Mega – Absolute Addons For Elementor
MediumCVE-2025-8151: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in devitemsllc HT Mega – Absolute Addons For Elementor
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.