CVE-2025-53105: CWE-269: Improper Privilege Management in glpi-project glpi
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 10.0.0 to before 10.0.19, a connected user without administration rights can change the rules execution order. This issue has been patched in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53105 is a high-severity vulnerability in GLPI (Gestionnaire Libre de Parc Informatique), an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 10.0.0 up to but not including 10.0.19. It is classified under CWE-269, which pertains to improper privilege management. Specifically, the flaw allows a connected user without administrative privileges to alter the execution order of rules within the system. This capability can lead to unauthorized changes in system behavior, potentially allowing privilege escalation or disruption of intended workflows. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network, requires low privileges but high attack complexity, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of GLPI deployments in managing IT infrastructure and assets. The issue was addressed in GLPI version 10.0.19, where proper privilege checks were presumably enforced to prevent non-administrative users from modifying rule execution order.
Potential Impact
For European organizations, this vulnerability could have serious consequences. GLPI is commonly used by enterprises, public sector institutions, and managed service providers across Europe to manage IT assets and service desks. An attacker exploiting this flaw could manipulate rule execution to bypass security controls, escalate privileges, or disrupt IT service management processes. This could lead to unauthorized access to sensitive asset data, manipulation of license tracking, or interference with incident management workflows, potentially causing operational downtime or data breaches. Given the critical role GLPI plays in IT service management, exploitation could affect confidentiality (exposure of sensitive IT asset information), integrity (unauthorized changes to system rules and configurations), and availability (disruption of IT service operations). The high CVSS score reflects these risks. European organizations relying on GLPI versions prior to 10.0.19 should consider this a priority vulnerability, especially those in regulated sectors such as finance, healthcare, and government, where IT asset integrity and service continuity are paramount.
Mitigation Recommendations
Organizations should immediately verify their GLPI version and upgrade to version 10.0.19 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement strict network segmentation to limit access to the GLPI management interface to trusted administrators only. Review and tighten user role assignments within GLPI to minimize the number of users with any elevated privileges. Conduct audits of rule configurations and execution orders to detect unauthorized changes. Additionally, monitor GLPI logs for anomalous activities indicative of exploitation attempts. Employ multi-factor authentication (MFA) for all GLPI user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, maintain an incident response plan tailored to IT service management systems to quickly respond to any detected exploitation.
Affected Countries
France, Germany, United Kingdom, Netherlands, Belgium, Italy, Spain, Sweden
CVE-2025-53105: CWE-269: Improper Privilege Management in glpi-project glpi
Description
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 10.0.0 to before 10.0.19, a connected user without administration rights can change the rules execution order. This issue has been patched in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53105 is a high-severity vulnerability in GLPI (Gestionnaire Libre de Parc Informatique), an open-source IT asset and service management software widely used for ITIL service desk operations, license tracking, and software auditing. The vulnerability affects GLPI versions from 10.0.0 up to but not including 10.0.19. It is classified under CWE-269, which pertains to improper privilege management. Specifically, the flaw allows a connected user without administrative privileges to alter the execution order of rules within the system. This capability can lead to unauthorized changes in system behavior, potentially allowing privilege escalation or disruption of intended workflows. The vulnerability has a CVSS v3.1 base score of 7.5, indicating high severity, with the vector string CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H. This means the attack can be performed remotely over the network, requires low privileges but high attack complexity, no user interaction, and impacts confidentiality, integrity, and availability to a high degree. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the sensitive nature of GLPI deployments in managing IT infrastructure and assets. The issue was addressed in GLPI version 10.0.19, where proper privilege checks were presumably enforced to prevent non-administrative users from modifying rule execution order.
Potential Impact
For European organizations, this vulnerability could have serious consequences. GLPI is commonly used by enterprises, public sector institutions, and managed service providers across Europe to manage IT assets and service desks. An attacker exploiting this flaw could manipulate rule execution to bypass security controls, escalate privileges, or disrupt IT service management processes. This could lead to unauthorized access to sensitive asset data, manipulation of license tracking, or interference with incident management workflows, potentially causing operational downtime or data breaches. Given the critical role GLPI plays in IT service management, exploitation could affect confidentiality (exposure of sensitive IT asset information), integrity (unauthorized changes to system rules and configurations), and availability (disruption of IT service operations). The high CVSS score reflects these risks. European organizations relying on GLPI versions prior to 10.0.19 should consider this a priority vulnerability, especially those in regulated sectors such as finance, healthcare, and government, where IT asset integrity and service continuity are paramount.
Mitigation Recommendations
Organizations should immediately verify their GLPI version and upgrade to version 10.0.19 or later, where the vulnerability is patched. If immediate upgrade is not feasible, implement strict network segmentation to limit access to the GLPI management interface to trusted administrators only. Review and tighten user role assignments within GLPI to minimize the number of users with any elevated privileges. Conduct audits of rule configurations and execution orders to detect unauthorized changes. Additionally, monitor GLPI logs for anomalous activities indicative of exploitation attempts. Employ multi-factor authentication (MFA) for all GLPI user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability. Finally, maintain an incident response plan tailored to IT service management systems to quickly respond to any detected exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.086Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68af1e37ad5a09ad00630d6b
Added to database: 8/27/2025, 3:03:19 PM
Last enriched: 8/27/2025, 3:17:49 PM
Last updated: 8/27/2025, 6:13:17 PM
Views: 5
Related Threats
CVE-2025-55495: n/a
HighCVE-2025-58050: CWE-125: Out-of-bounds Read in PCRE2Project pcre2
MediumCVE-2025-51667: n/a
HighCVE-2025-50979: n/a
HighCVE-2025-55422: n/a
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.