CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory
pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.
AI Analysis
Technical Summary
CVE-2025-53360 is an improper access control vulnerability classified under CWE-284 affecting the pluginsGLPI Database Inventory Plugin, specifically versions before 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. The vulnerability arises because any authenticated user, regardless of their privilege level, can send requests to these agents. This lack of proper access control means that users who should not have management permissions can interact with the agents, potentially causing disruptions or unauthorized operations related to database inventories. The flaw does not allow for data disclosure or modification (no confidentiality or integrity impact), but it can affect availability by interfering with the inventory process. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The issue was addressed in version 1.0.3 of the plugin, which implements proper access controls to restrict agent requests to authorized users only. No public exploits have been reported to date, but the vulnerability's presence in widely used inventory management systems could pose operational risks if left unpatched.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability and reliability of database inventory operations managed through pluginsGLPI. Disruptions in inventory processes can impair asset management, compliance reporting, and vulnerability assessments, potentially delaying critical security responses. While no direct data breach risk exists, unauthorized manipulation of inventory agents could lead to inaccurate asset data, complicating security management. Organizations relying heavily on GLPI for IT asset and database inventory management, especially in sectors like finance, healthcare, and government, may face operational inefficiencies or increased risk exposure. The vulnerability's exploitation requires authenticated access, so insider threats or compromised user credentials could be leveraged. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with lax access controls or outdated software. Failure to patch could also increase risk during targeted attacks or lateral movement scenarios within networks.
Mitigation Recommendations
1. Upgrade the pluginsGLPI Database Inventory Plugin to version 1.0.3 or later immediately to apply the official patch addressing the access control flaw. 2. Restrict plugin access strictly to trusted and necessary users by implementing role-based access controls within GLPI, minimizing the number of authenticated users who can interact with inventory agents. 3. Monitor network traffic and logs for unusual or unauthorized requests sent to Teclib inventory agents, enabling early detection of exploitation attempts. 4. Enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. 5. Segment network access to inventory agents where possible, limiting exposure to only essential systems and users. 6. Conduct regular audits of GLPI user permissions and plugin configurations to ensure compliance with security policies. 7. Educate IT and security teams about this vulnerability and the importance of timely patching and access control enforcement.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory
Description
pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-53360 is an improper access control vulnerability classified under CWE-284 affecting the pluginsGLPI Database Inventory Plugin, specifically versions before 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. The vulnerability arises because any authenticated user, regardless of their privilege level, can send requests to these agents. This lack of proper access control means that users who should not have management permissions can interact with the agents, potentially causing disruptions or unauthorized operations related to database inventories. The flaw does not allow for data disclosure or modification (no confidentiality or integrity impact), but it can affect availability by interfering with the inventory process. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The issue was addressed in version 1.0.3 of the plugin, which implements proper access controls to restrict agent requests to authorized users only. No public exploits have been reported to date, but the vulnerability's presence in widely used inventory management systems could pose operational risks if left unpatched.
Potential Impact
For European organizations, this vulnerability primarily threatens the availability and reliability of database inventory operations managed through pluginsGLPI. Disruptions in inventory processes can impair asset management, compliance reporting, and vulnerability assessments, potentially delaying critical security responses. While no direct data breach risk exists, unauthorized manipulation of inventory agents could lead to inaccurate asset data, complicating security management. Organizations relying heavily on GLPI for IT asset and database inventory management, especially in sectors like finance, healthcare, and government, may face operational inefficiencies or increased risk exposure. The vulnerability's exploitation requires authenticated access, so insider threats or compromised user credentials could be leveraged. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with lax access controls or outdated software. Failure to patch could also increase risk during targeted attacks or lateral movement scenarios within networks.
Mitigation Recommendations
1. Upgrade the pluginsGLPI Database Inventory Plugin to version 1.0.3 or later immediately to apply the official patch addressing the access control flaw. 2. Restrict plugin access strictly to trusted and necessary users by implementing role-based access controls within GLPI, minimizing the number of authenticated users who can interact with inventory agents. 3. Monitor network traffic and logs for unusual or unauthorized requests sent to Teclib inventory agents, enabling early detection of exploitation attempts. 4. Enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. 5. Segment network access to inventory agents where possible, limiting exposure to only essential systems and users. 6. Conduct regular audits of GLPI user permissions and plugin configurations to ensure compliance with security policies. 7. Educate IT and security teams about this vulnerability and the importance of timely patching and access control enforcement.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-27T12:57:16.121Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c9c349b9483ee9a797597
Added to database: 11/18/2025, 4:17:56 PM
Last enriched: 11/18/2025, 4:27:21 PM
Last updated: 11/19/2025, 3:52:08 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-6251: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wproyal Royal Addons for Elementor – Addons and Templates Kit for Elementor
MediumCVE-2025-12777: CWE-285 Improper Authorization in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-12770: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in saadiqbal New User Approve
MediumCVE-2025-12427: CWE-639 Authorization Bypass Through User-Controlled Key in yithemes YITH WooCommerce Wishlist
MediumCVE-2025-13051: CWE-427 Uncontrolled Search Path Element in ASUSTOR ABP and AES
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.