Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53360: CWE-284: Improper Access Control in pluginsGLPI databaseinventory

0
Medium
VulnerabilityCVE-2025-53360cvecve-2025-53360cwe-284
Published: Tue Nov 18 2025 (11/18/2025, 16:12:15 UTC)
Source: CVE Database V5
Vendor/Project: pluginsGLPI
Product: databaseinventory

Description

pluginsGLPI's Database Inventory Plugin "manages" the Teclib' inventory agents in order to perform an inventory of the databases present on the workstation. In versions prior to 1.0.3, any authenticated user could send requests to agents. This issue has been patched in version 1.0.3.

AI-Powered Analysis

AILast updated: 11/18/2025, 16:27:21 UTC

Technical Analysis

CVE-2025-53360 is an improper access control vulnerability classified under CWE-284 affecting the pluginsGLPI Database Inventory Plugin, specifically versions before 1.0.3. This plugin manages Teclib inventory agents that perform database inventories on workstations. The vulnerability arises because any authenticated user, regardless of their privilege level, can send requests to these agents. This lack of proper access control means that users who should not have management permissions can interact with the agents, potentially causing disruptions or unauthorized operations related to database inventories. The flaw does not allow for data disclosure or modification (no confidentiality or integrity impact), but it can affect availability by interfering with the inventory process. The vulnerability is exploitable remotely over the network (AV:N), requires low privileges (PR:L), and does not require user interaction (UI:N). The scope is unchanged (S:U), meaning the impact is limited to the vulnerable component. The issue was addressed in version 1.0.3 of the plugin, which implements proper access controls to restrict agent requests to authorized users only. No public exploits have been reported to date, but the vulnerability's presence in widely used inventory management systems could pose operational risks if left unpatched.

Potential Impact

For European organizations, this vulnerability primarily threatens the availability and reliability of database inventory operations managed through pluginsGLPI. Disruptions in inventory processes can impair asset management, compliance reporting, and vulnerability assessments, potentially delaying critical security responses. While no direct data breach risk exists, unauthorized manipulation of inventory agents could lead to inaccurate asset data, complicating security management. Organizations relying heavily on GLPI for IT asset and database inventory management, especially in sectors like finance, healthcare, and government, may face operational inefficiencies or increased risk exposure. The vulnerability's exploitation requires authenticated access, so insider threats or compromised user credentials could be leveraged. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially in environments with lax access controls or outdated software. Failure to patch could also increase risk during targeted attacks or lateral movement scenarios within networks.

Mitigation Recommendations

1. Upgrade the pluginsGLPI Database Inventory Plugin to version 1.0.3 or later immediately to apply the official patch addressing the access control flaw. 2. Restrict plugin access strictly to trusted and necessary users by implementing role-based access controls within GLPI, minimizing the number of authenticated users who can interact with inventory agents. 3. Monitor network traffic and logs for unusual or unauthorized requests sent to Teclib inventory agents, enabling early detection of exploitation attempts. 4. Enforce strong authentication mechanisms and credential hygiene to reduce the risk of compromised accounts being used to exploit this vulnerability. 5. Segment network access to inventory agents where possible, limiting exposure to only essential systems and users. 6. Conduct regular audits of GLPI user permissions and plugin configurations to ensure compliance with security policies. 7. Educate IT and security teams about this vulnerability and the importance of timely patching and access control enforcement.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-06-27T12:57:16.121Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c9c349b9483ee9a797597

Added to database: 11/18/2025, 4:17:56 PM

Last enriched: 11/18/2025, 4:27:21 PM

Last updated: 11/19/2025, 3:52:08 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats