Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory

0
Medium
VulnerabilityCVE-2025-53360cvecve-2025-53360cwe-284
Published: Tue Nov 18 2025 (11/18/2025, 16:12:15 UTC)
Source: CVE Database V5
Vendor/Project: pluginsGLPI
Product: databaseinventory

Description

pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.

AI-Powered Analysis

AILast updated: 11/25/2025, 17:16:23 UTC

Technical Analysis

The vulnerability identified as CVE-2025-53360 affects the pluginsGLPI Database Inventory Plugin, specifically versions earlier than 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. Due to improper access control (CWE-284), any authenticated user—regardless of privilege level—can send requests directly to these agents. This lack of proper authorization checks enables users to potentially disrupt the inventory process or cause denial of service conditions by sending unauthorized commands or malformed requests. The vulnerability does not allow unauthorized access to sensitive data or modification of data, but it does impact the availability of the inventory service. The vulnerability is remotely exploitable over the network without user interaction and requires only low privileges (authenticated user). The CVSS 3.1 base score is 4.3, reflecting a medium severity level primarily due to the limited impact on confidentiality and integrity but with some availability impact. The issue was publicly disclosed on November 18, 2025, and has been addressed in pluginsGLPI databaseinventory plugin version 1.0.3, which implements proper access control mechanisms to restrict agent requests to authorized users only.

Potential Impact

For European organizations, the primary impact of this vulnerability is the potential disruption of database inventory operations managed via the pluginsGLPI Database Inventory Plugin. This could lead to incomplete or inaccurate asset inventories, affecting IT asset management, compliance reporting, and vulnerability assessments. While it does not directly expose sensitive data or allow data manipulation, denial of service or interference with inventory agents could delay critical security and operational processes. Organizations relying heavily on GLPI for IT service management and asset tracking may experience operational inefficiencies. In regulated industries, incomplete inventories could impact compliance with data governance and security standards. However, the impact is limited to availability and does not extend to confidentiality or integrity breaches.

Mitigation Recommendations

European organizations using pluginsGLPI with the databaseinventory plugin should immediately upgrade to version 1.0.3 or later to apply the official patch that enforces proper access control. Until patching is possible, restrict access to the GLPI platform to trusted users only and implement network segmentation to limit communication between authenticated users and inventory agents. Monitor logs for unusual or unauthorized requests to the inventory agents. Employ role-based access controls (RBAC) within GLPI to minimize the number of users with authenticated access capable of interacting with the plugin. Additionally, consider deploying Web Application Firewalls (WAFs) or Intrusion Detection Systems (IDS) to detect and block anomalous requests targeting the inventory agents. Regularly audit user privileges and remove unnecessary accounts to reduce the attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-27T12:57:16.121Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c9c349b9483ee9a797597

Added to database: 11/18/2025, 4:17:56 PM

Last enriched: 11/25/2025, 5:16:23 PM

Last updated: 1/7/2026, 8:45:34 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats