CVE-2025-53113: CWE-284: Improper Access Control in glpi-project glpi
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use the external links feature to fetch information on items they do not have the right to see. This is fixed in version 10.0.19.
AI Analysis
Technical Summary
CVE-2025-53113 is a security vulnerability identified in the GLPI (Gestionnaire Libre de Parc Informatique) software, a widely used free and open-source IT asset and service management tool that supports ITIL service desk functionalities, license tracking, and software auditing. The vulnerability affects GLPI versions from 0.65 up to, but not including, 10.0.19. It involves improper access control (CWE-284) and unauthorized access (CWE-862) in the external links feature. Specifically, a user with technician-level privileges can exploit this flaw to retrieve information about items or assets they are not authorized to view. This unauthorized data access occurs because the system fails to properly enforce access restrictions on external link queries, allowing privilege escalation within the scope of information disclosure. The vulnerability does not require user interaction and can be exploited remotely (AV:N) but requires the attacker to have high privileges (PR:H), meaning the attacker must already be authenticated as a technician or equivalent role. The impact is limited to confidentiality as there is no indication of integrity or availability compromise. The issue was addressed and fixed in GLPI version 10.0.19. The CVSS v3.1 base score is 2.7, indicating a low severity level due to the limited scope and required privileges. No known exploits are currently reported in the wild. This vulnerability highlights the importance of strict access control enforcement in IT asset management platforms, especially those used in enterprise environments where sensitive asset and service data is managed.
Potential Impact
For European organizations, the impact of CVE-2025-53113 primarily concerns the confidentiality of sensitive IT asset information managed within GLPI installations. Unauthorized access to asset details, license information, or service desk tickets could lead to information leakage that may aid further targeted attacks or internal misuse. While the vulnerability does not directly affect system integrity or availability, the exposure of sensitive operational data could compromise organizational security postures, especially in regulated industries such as finance, healthcare, and government sectors prevalent in Europe. Organizations relying on GLPI for IT asset management may face compliance risks under GDPR if personal or sensitive data is inadvertently exposed. Additionally, the requirement for attacker authentication limits the threat to insiders or compromised technician accounts, emphasizing the need for strong internal access controls and monitoring. The low CVSS score reflects limited risk, but the potential for information disclosure in critical infrastructure or large enterprises with extensive GLPI deployments should not be overlooked.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 10.0.19 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict role-based access controls to limit technician privileges only to necessary personnel and monitor access logs for unusual activity related to external links or asset queries. Network segmentation can be used to restrict access to the GLPI management interface to trusted internal networks and VPN users. Additionally, multi-factor authentication (MFA) should be enforced for all technician accounts to reduce the risk of credential compromise. Regular audits of user permissions and periodic reviews of GLPI configurations can help detect and prevent privilege escalation attempts. Organizations should also consider deploying intrusion detection systems (IDS) or security information and event management (SIEM) solutions to alert on anomalous access patterns within GLPI. Finally, educating IT staff about the risks of improper access and the importance of timely patching is critical to maintaining a secure environment.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2025-53113: CWE-284: Improper Access Control in glpi-project glpi
Description
GLPI, which stands for Gestionnaire Libre de Parc Informatique, is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions 0.65 through 10.0.18, a technician can use the external links feature to fetch information on items they do not have the right to see. This is fixed in version 10.0.19.
AI-Powered Analysis
Technical Analysis
CVE-2025-53113 is a security vulnerability identified in the GLPI (Gestionnaire Libre de Parc Informatique) software, a widely used free and open-source IT asset and service management tool that supports ITIL service desk functionalities, license tracking, and software auditing. The vulnerability affects GLPI versions from 0.65 up to, but not including, 10.0.19. It involves improper access control (CWE-284) and unauthorized access (CWE-862) in the external links feature. Specifically, a user with technician-level privileges can exploit this flaw to retrieve information about items or assets they are not authorized to view. This unauthorized data access occurs because the system fails to properly enforce access restrictions on external link queries, allowing privilege escalation within the scope of information disclosure. The vulnerability does not require user interaction and can be exploited remotely (AV:N) but requires the attacker to have high privileges (PR:H), meaning the attacker must already be authenticated as a technician or equivalent role. The impact is limited to confidentiality as there is no indication of integrity or availability compromise. The issue was addressed and fixed in GLPI version 10.0.19. The CVSS v3.1 base score is 2.7, indicating a low severity level due to the limited scope and required privileges. No known exploits are currently reported in the wild. This vulnerability highlights the importance of strict access control enforcement in IT asset management platforms, especially those used in enterprise environments where sensitive asset and service data is managed.
Potential Impact
For European organizations, the impact of CVE-2025-53113 primarily concerns the confidentiality of sensitive IT asset information managed within GLPI installations. Unauthorized access to asset details, license information, or service desk tickets could lead to information leakage that may aid further targeted attacks or internal misuse. While the vulnerability does not directly affect system integrity or availability, the exposure of sensitive operational data could compromise organizational security postures, especially in regulated industries such as finance, healthcare, and government sectors prevalent in Europe. Organizations relying on GLPI for IT asset management may face compliance risks under GDPR if personal or sensitive data is inadvertently exposed. Additionally, the requirement for attacker authentication limits the threat to insiders or compromised technician accounts, emphasizing the need for strong internal access controls and monitoring. The low CVSS score reflects limited risk, but the potential for information disclosure in critical infrastructure or large enterprises with extensive GLPI deployments should not be overlooked.
Mitigation Recommendations
European organizations using GLPI should immediately upgrade to version 10.0.19 or later to remediate this vulnerability. Until the upgrade is applied, organizations should implement strict role-based access controls to limit technician privileges only to necessary personnel and monitor access logs for unusual activity related to external links or asset queries. Network segmentation can be used to restrict access to the GLPI management interface to trusted internal networks and VPN users. Additionally, multi-factor authentication (MFA) should be enforced for all technician accounts to reduce the risk of credential compromise. Regular audits of user permissions and periodic reviews of GLPI configurations can help detect and prevent privilege escalation attempts. Organizations should also consider deploying intrusion detection systems (IDS) or security information and event management (SIEM) solutions to alert on anomalous access patterns within GLPI. Finally, educating IT staff about the risks of improper access and the importance of timely patching is critical to maintaining a secure environment.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-25T13:41:23.088Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688a2d10ad5a09ad00a699b1
Added to database: 7/30/2025, 2:32:48 PM
Last enriched: 7/30/2025, 2:48:17 PM
Last updated: 7/31/2025, 3:52:32 AM
Views: 7
Related Threats
CVE-2025-8370: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-8369: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-8368: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-53558: Use of weak credentials in ZTE Japan. K.K. ZXHN-F660T
HighCVE-2025-8367: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.