CVE-2025-53111: CWE-284: Improper Access Control in glpi-project glpi
GLPI is a Free Asset and IT Management Software package. In versions 0.80 through 10.0.18, a lack of permission checks can result in unauthorized access to some resources. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53111 is a medium-severity vulnerability affecting the GLPI software, a widely used free asset and IT management platform. The vulnerability arises from improper access control (CWE-284) and inadequate authorization checks (CWE-862) in versions from 0.80 up to 10.0.18 inclusive. Specifically, the software lacks sufficient permission verification, allowing users with limited privileges (requiring at least some level of authentication) to gain unauthorized access to certain resources. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact primarily affects confidentiality, as unauthorized users can view sensitive data without proper authorization, but does not affect integrity or availability. The vulnerability has been addressed in version 10.0.19 of GLPI. There are no known exploits in the wild at this time. The CVSS v3.1 base score is 6.5, reflecting the medium severity due to the high confidentiality impact but limited scope and required privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive IT asset and management data stored within GLPI instances. Unauthorized access could lead to exposure of internal infrastructure details, asset inventories, user information, or configuration data, which could be leveraged for further attacks or espionage. Organizations relying on GLPI for IT service management, particularly in sectors such as government, healthcare, finance, and critical infrastructure, may face compliance issues under GDPR and other data protection regulations if sensitive data is exposed. Although the vulnerability does not directly impact system integrity or availability, the unauthorized disclosure of confidential information can undermine trust and operational security. The requirement for at least some level of authentication reduces the risk from anonymous attackers but does not eliminate the threat from insider threats or compromised accounts.
Mitigation Recommendations
European organizations using GLPI should urgently upgrade all affected instances to version 10.0.19 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should implement strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions. Conduct thorough audits of user permissions to detect any privilege escalations or anomalous access patterns. Network segmentation and firewall rules should restrict access to GLPI management interfaces to trusted internal networks or VPN users. Additionally, enable and review GLPI logging features to detect unauthorized access attempts. Organizations should also consider multi-factor authentication (MFA) for GLPI accounts to reduce the risk of credential compromise. Finally, ensure that incident response plans include procedures for potential data exposure scenarios related to this vulnerability.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-53111: CWE-284: Improper Access Control in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package. In versions 0.80 through 10.0.18, a lack of permission checks can result in unauthorized access to some resources. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53111 is a medium-severity vulnerability affecting the GLPI software, a widely used free asset and IT management platform. The vulnerability arises from improper access control (CWE-284) and inadequate authorization checks (CWE-862) in versions from 0.80 up to 10.0.18 inclusive. Specifically, the software lacks sufficient permission verification, allowing users with limited privileges (requiring at least some level of authentication) to gain unauthorized access to certain resources. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact primarily affects confidentiality, as unauthorized users can view sensitive data without proper authorization, but does not affect integrity or availability. The vulnerability has been addressed in version 10.0.19 of GLPI. There are no known exploits in the wild at this time. The CVSS v3.1 base score is 6.5, reflecting the medium severity due to the high confidentiality impact but limited scope and required privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive IT asset and management data stored within GLPI instances. Unauthorized access could lead to exposure of internal infrastructure details, asset inventories, user information, or configuration data, which could be leveraged for further attacks or espionage. Organizations relying on GLPI for IT service management, particularly in sectors such as government, healthcare, finance, and critical infrastructure, may face compliance issues under GDPR and other data protection regulations if sensitive data is exposed. Although the vulnerability does not directly impact system integrity or availability, the unauthorized disclosure of confidential information can undermine trust and operational security. The requirement for at least some level of authentication reduces the risk from anonymous attackers but does not eliminate the threat from insider threats or compromised accounts.
Mitigation Recommendations
European organizations using GLPI should urgently upgrade all affected instances to version 10.0.19 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should implement strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions. Conduct thorough audits of user permissions to detect any privilege escalations or anomalous access patterns. Network segmentation and firewall rules should restrict access to GLPI management interfaces to trusted internal networks or VPN users. Additionally, enable and review GLPI logging features to detect unauthorized access attempts. Organizations should also consider multi-factor authentication (MFA) for GLPI accounts to reduce the risk of credential compromise. Finally, ensure that incident response plans include procedures for potential data exposure scenarios related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.087Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699ab
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 7/30/2025, 2:48:42 PM
Last updated: 7/31/2025, 5:36:27 AM
Views: 9
Related Threats
CVE-2025-8379: Unrestricted Upload in Campcodes Online Hotel Reservation System
MediumCVE-2025-8378: SQL Injection in Campcodes Online Hotel Reservation System
MediumCVE-2025-41688: CWE-653 Improper Isolation or Compartmentalization in MB connect line mbNET HW1
HighCVE-2025-2813: CWE-770 Allocation of Resources Without Limits or Throttling in Phoenix Contact AXL F BK PN TPS
HighCVE-2025-40980: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in UltimateFosters UltimatePOS
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.