CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory
pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-53360 affects the pluginsGLPI Database Inventory Plugin, specifically versions earlier than 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. Due to improper access control (CWE-284), any authenticated user—regardless of privilege level—can send requests directly to these agents. This lack of proper authorization checks enables users to potentially disrupt the inventory process or cause denial of service conditions by sending unauthorized commands or malformed requests. The vulnerability does not allow unauthorized access to sensitive data or modification of data, but it does impact the availability of the inventory service. The vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated user). The CVSS 3.1 base score is 4.3, reflecting a medium severity level primarily due to the limited impact on confidentiality and integrity but with some availability impact. The issue was publicly disclosed on November 18, 2025, and has been addressed in pluginsGLPI databaseinventory plugin version 1.0.3, which implements proper access control mechanisms to restrict agent requests to authorized users only.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of database inventory operations managed via the pluginsGLPI Database Inventory Plugin. This could lead to incomplete or inaccurate asset inventories, affecting IT asset management, compliance reporting, and vulnerability assessments. While it does not directly expose sensitive data or allow data manipulation, denial of service or interference with inventory agents could delay critical security and operational processes. Organizations relying heavily on GLPI for IT service management and asset tracking may experience operational inefficiencies. In regulated industries, incomplete inventories could impact compliance with data governance and security standards. However, the impact is limited to availability and does not extend to confidentiality or integrity breaches.
Mitigation Recommendations
European organizations using pluginsGLPI with the databaseinventory plugin should immediately upgrade to version 1.0.3 or later to apply the official patch that enforces proper access control. Until patching is possible, restrict access to the GLPI platform to trusted users only and implement network segmentation to limit communication between authenticated users and inventory agents. Monitor logs for unusual or unauthorized requests to the inventory agents. Employ role-based access controls (RBAC) within GLPI to minimize the number of users with authenticated access capable of interacting with the plugin. Additionally, consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block anomalous requests targeting the inventory agents. Regularly audit user privileges and remove unnecessary accounts to reduce the attack surface.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium
CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory
Description
pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-53360 affects the pluginsGLPI Database Inventory Plugin, specifically versions earlier than 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. Due to improper access control (CWE-284), any authenticated user—regardless of privilege level—can send requests directly to these agents. This lack of proper authorization checks enables users to potentially disrupt the inventory process or cause denial of service conditions by sending unauthorized commands or malformed requests. The vulnerability does not allow unauthorized access to sensitive data or modification of data, but it does impact the availability of the inventory service. The vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated user). The CVSS 3.1 base score is 4.3, reflecting a medium severity level primarily due to the limited impact on confidentiality and integrity but with some availability impact. The issue was publicly disclosed on November 18, 2025, and has been addressed in pluginsGLPI databaseinventory plugin version 1.0.3, which implements proper access control mechanisms to restrict agent requests to authorized users only.
Potential Impact
For European organizations, the primary impact of this vulnerability is the potential disruption of database inventory operations managed via the pluginsGLPI Database Inventory Plugin. This could lead to incomplete or inaccurate asset inventories, affecting IT asset management, compliance reporting, and vulnerability assessments. While it does not directly expose sensitive data or allow data manipulation, denial of service or interference with inventory agents could delay critical security and operational processes. Organizations relying heavily on GLPI for IT service management and asset tracking may experience operational inefficiencies. In regulated industries, incomplete inventories could impact compliance with data governance and security standards. However, the impact is limited to availability and does not extend to confidentiality or integrity breaches.
Mitigation Recommendations
European organizations using pluginsGLPI with the databaseinventory plugin should immediately upgrade to version 1.0.3 or later to apply the official patch that enforces proper access control. Until patching is possible, restrict access to the GLPI platform to trusted users only and implement network segmentation to limit communication between authenticated users and inventory agents. Monitor logs for unusual or unauthorized requests to the inventory agents. Employ role-based access controls (RBAC) within GLPI to minimize the number of users with authenticated access capable of interacting with the plugin. Additionally, consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block anomalous requests targeting the inventory agents. Regularly audit user privileges and remove unnecessary accounts to reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-27T12:57:16.121Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c9c349b9483ee9a797597
Added to database: 11/18/2025, 4:17:56 PM
Last enriched: 11/25/2025, 5:16:23 PM
Last updated: 1/7/2026, 8:45:34 AM
Views: 74
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.