Skip to main content

CVE-2025-53113: CWE-284: Improper Access Control in glpi-project glpi

Low
VulnerabilityCVE-2025-53113cvecve-2025-53113cwe-284cwe-862
Published: Wed Jul 30 2025 (07/30/2025, 14:16:36 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use the external links feature to fetch information on items they do not have the right to see. This is fixed in version 10.0.19.

AI-Powered Analysis

AILast updated: 07/30/2025, 14:48:17 UTC

Technical Analysis

CVE-2025-53113 is a security vulnerability identified in the GLPI (Gestionnaire Libre de Parc Informatique) software, a widely used free and open-source IT asset and service management tool that supports ITIL service desk functionalities, license tracking, and software auditing. The vulnerability affects GLPI versions from 0.65 up to, but not including, 10.0.19. It involves improper access control (CWE-284) and unauthorized access (CWE-862) in the external links feature. Specifically, a user with technician-level privileges can exploit this flaw to retrieve information about items or assets they are not authorized to view. This unauthorized data access occurs because the system fails to properly enforce access restrictions on external link queries, allowing privilege escalation within the scope of information disclosure. The vulnerability does not require user interaction and can be exploited remotely (AV:N) but requires the attacker to have high privileges (PR:H), meaning the attacker must already be authenticated as a technician or equivalent role. The impact is limited to confidentiality as there is no indication of integrity or availability compromise. The issue was addressed and fixed in GLPI version 10.0.19. The CVSS v3.1 base score is 2.7, indicating a low severity level due to the limited scope and required privileges. No known exploits are currently reported in the wild. This vulnerability highlights the importance of strict access control enforcement in IT asset management platforms, especially those used in enterprise environments where sensitive asset and service data is managed.

Potential Impact

For European organizations, the impact of CVE-2025-53113 primarily concerns the confidentiality of sensitive IT asset information managed within GLPI installations. Unauthorized access to asset details, license information, or service desk tickets could lead to information leakage that may aid further targeted attacks or internal misuse. While the vulnerability does not directly affect system integrity or availability, the exposure of sensitive operational data could compromise organizational security postures, especially in regulated industries such as finance, healthcare, and government sectors prevalent in Europe. Organizations relying on GLPI for IT asset management may face compliance risks under GDPR if personal or sensitive data is inadvertently exposed. Additionally, the requirement for attacker authentication limits the threat to insiders or compromised technician accounts, emphasizing the need for strong internal access controls and monitoring. The low CVSS score reflects limited risk, but the potential for information disclosure in critical infrastructure or large enterprises with extensive GLPI deployments should not be overlooked.

Mitigation Recommendations

European organizations using GLPI should immediately upgrade to version 10.0.19 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict role-based access controls to limit technician privileges only to necessary personnel and monitor access logs for unusual activity related to external links or asset queries. Network segmentation can be used to restrict access to the GLPI management interface to trusted internal networks and VPN users. Additionally, multi-factor authentication (MFA) should be enforced for all technician accounts to reduce the risk of credential compromise. Regular audits of user permissions and periodic reviews of GLPI configurations can help detect and prevent privilege escalation attempts. Organizations should also consider deploying intrusion detection systems (IDS) or security information and event management (SIEM) solutions to alert on anomalous access patterns within GLPI. Finally, educating IT staff about the risks of improper access and the importance of timely patching is critical to maintaining a secure environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-06-25T13:41:23.088Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688a2d10ad5a09ad00a699b1

Added to database: 7/30/2025, 2:32:48 PM

Last enriched: 7/30/2025, 2:48:17 PM

Last updated: 7/31/2025, 3:52:32 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats