Skip to main content

CVE-2025-53105: CWE-269: Improper Privilege Management in glpi-project glpi

High
VulnerabilityCVE-2025-53105cvecve-2025-53105cwe-269
Published: Wed Aug 27 2025 (08/27/2025, 14:40:36 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 10.0.0 to before 10.0.19, a connected user without administration rights can change the rules execution order. This issue has been patched in version 10.0.19.

AI-Powered Analysis

AILast updated: 08/27/2025, 15:17:49 UTC

Technical Analysis

CVE-2025-53105 is a high-severity vulnerability in GLPI (Gestionnaire Libre de Parc Informatique), an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 10.0.0 up to but not including 10.0.19. It is classified under CWE-269, which pertains to improper privilege management. Specifically, the flaw allows a connected user without administrative privileges to alter the execution order of rules within the system. This capability can lead to unauthorized changes in system behavior, potentially allowing privilege escalation or disruption of intended workflows. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network, requires low privileges but high attack complexity, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of GLPI deployments in managing IT infrastructure and assets. The issue was addressed in GLPI version 10.0.19, where proper privilege checks were presumably enforced to prevent non-administrative users from modifying rule execution order.

Potential Impact

For European organizations, this vulnerability could have serious consequences. GLPI is commonly used by enterprises, public sector institutions, and managed service providers across Europe to manage IT assets and service desks. An attacker exploiting this flaw could manipulate rule execution to bypass security controls, escalate privileges, or disrupt IT service management processes. This could lead to unauthorized access to sensitive asset data, manipulation of license tracking, or interference with incident management workflows, potentially causing operational downtime or data breaches. Given the critical role GLPI plays in IT service management, exploitation could affect confidentiality (exposure of sensitive IT asset information), integrity (unauthorized changes to system rules and configurations), and availability (disruption of IT service operations). The high CVSS score reflects these risks. European organizations relying on GLPI versions prior to 10.0.19 should consider this a priority vulnerability, especially those in regulated sectors such as finance, healthcare, and government, where IT asset integrity and service continuity are paramount.

Mitigation Recommendations

Organizations should immediately verify their GLPI version and upgrade to version 10.0.19 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement strict network segmentation to limit access to the GLPI management interface to trusted administrators only. Review and tighten user role assignments within GLPI to minimize the number of users with any elevated privileges. Conduct audits of rule configurations and execution orders to detect unauthorized changes. Additionally, monitor GLPI logs for anomalous activities indicative of exploitation attempts. Employ multi-factor authentication (MFA) for all GLPI user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, maintain an incident response plan tailored to IT service management systems to quickly respond to any detected exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-25T13:41:23.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68af1e37ad5a09ad00630d6b

Added to database: 8/27/2025, 3:03:19 PM

Last enriched: 8/27/2025, 3:17:49 PM

Last updated: 8/27/2025, 6:13:17 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats