CVE-2025-53111: CWE-284: Improper Access Control in glpi-project glpi
GLPI is a Free Asset and IT Management Software package. In versions 0.80 through 10.0.18, a lack of permission checks can result in unauthorized access to some resources. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53111 is a medium-severity vulnerability affecting the GLPI software, a widely used free asset and IT management platform. The vulnerability arises from improper access control (CWE-284) and inadequate authorization checks (CWE-862) in versions from 0.80 up to 10.0.18 inclusive. Specifically, the software lacks sufficient permission verification, allowing users with limited privileges (requiring at least some level of authentication) to gain unauthorized access to certain resources. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact primarily affects confidentiality, as unauthorized users can view sensitive data without proper authorization, but does not affect integrity or availability. The vulnerability has been addressed in version 10.0.19 of GLPI. There are no known exploits in the wild at this time. The CVSS v3.1 base score is 6.5, reflecting the medium severity due to the high confidentiality impact but limited scope and required privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive IT asset and management data stored within GLPI instances. Unauthorized access could lead to exposure of internal infrastructure details, asset inventories, user information, or configuration data, which could be leveraged for further attacks or espionage. Organizations relying on GLPI for IT service management, particularly in sectors such as government, healthcare, finance, and critical infrastructure, may face compliance issues under GDPR and other data protection regulations if sensitive data is exposed. Although the vulnerability does not directly impact system integrity or availability, the unauthorized disclosure of confidential information can undermine trust and operational security. The requirement for at least some level of authentication reduces the risk from anonymous attackers but does not eliminate the threat from insider threats or compromised accounts.
Mitigation Recommendations
European organizations using GLPI should urgently upgrade all affected instances to version 10.0.19 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should implement strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions. Conduct thorough audits of user permissions to detect any privilege escalations or anomalous access patterns. Network segmentation and firewall rules should restrict access to GLPI management interfaces to trusted internal networks or VPN users. Additionally, enable and review GLPI logging features to detect unauthorized access attempts. Organizations should also consider multi-factor authentication (MFA) for GLPI accounts to reduce the risk of credential compromise. Finally, ensure that incident response plans include procedures for potential data exposure scenarios related to this vulnerability.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-53111: CWE-284: Improper Access Control in glpi-project glpi
Description
GLPI is a Free Asset and IT Management Software package. In versions 0.80 through 10.0.18, a lack of permission checks can result in unauthorized access to some resources. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53111 is a medium-severity vulnerability affecting the GLPI software, a widely used free asset and IT management platform. The vulnerability arises from improper access control (CWE-284) and inadequate authorization checks (CWE-862) in versions from 0.80 up to 10.0.18 inclusive. Specifically, the software lacks sufficient permission verification, allowing users with limited privileges (requiring at least some level of authentication) to gain unauthorized access to certain resources. The vulnerability does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L). The impact primarily affects confidentiality, as unauthorized users can view sensitive data without proper authorization, but does not affect integrity or availability. The vulnerability has been addressed in version 10.0.19 of GLPI. There are no known exploits in the wild at this time. The CVSS v3.1 base score is 6.5, reflecting the medium severity due to the high confidentiality impact but limited scope and required privileges.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive IT asset and management data stored within GLPI instances. Unauthorized access could lead to exposure of internal infrastructure details, asset inventories, user information, or configuration data, which could be leveraged for further attacks or espionage. Organizations relying on GLPI for IT service management, particularly in sectors such as government, healthcare, finance, and critical infrastructure, may face compliance issues under GDPR and other data protection regulations if sensitive data is exposed. Although the vulnerability does not directly impact system integrity or availability, the unauthorized disclosure of confidential information can undermine trust and operational security. The requirement for at least some level of authentication reduces the risk from anonymous attackers but does not eliminate the threat from insider threats or compromised accounts.
Mitigation Recommendations
European organizations using GLPI should urgently upgrade all affected instances to version 10.0.19 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should implement strict access controls and monitoring on GLPI user accounts, especially limiting privileges to only those necessary for job functions. Conduct thorough audits of user permissions to detect any privilege escalations or anomalous access patterns. Network segmentation and firewall rules should restrict access to GLPI management interfaces to trusted internal networks or VPN users. Additionally, enable and review GLPI logging features to detect unauthorized access attempts. Organizations should also consider multi-factor authentication (MFA) for GLPI accounts to reduce the risk of credential compromise. Finally, ensure that incident response plans include procedures for potential data exposure scenarios related to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.087Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699ab
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 7/30/2025, 2:48:42 PM
Last updated: 10/30/2025, 2:15:20 PM
Views: 57
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-43941: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Dell Unity
HighX-Request-Purpose: Identifying "research" and bug bounty related scans?, (Thu, Oct 30th)
MediumCVE-2025-10348: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Eveo URVE Smart Office
MediumMillions Impacted by Conduent Data Breach
MediumCVE-2025-63608: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.