Skip to main content

CVE-2025-54780: CWE-73: External Control of File Name or Path in cconard96 glpi-screenshot-plugin

High
VulnerabilityCVE-2025-54780cvecve-2025-54780cwe-73
Published: Tue Aug 05 2025 (08/05/2025, 00:08:37 UTC)
Source: CVE Database V5
Vendor/Project: cconard96
Product: glpi-screenshot-plugin

Description

The glpi-screenshot-plugin allows users to take screenshots or screens recording directly from GLPI. In versions below 2.0.2, authenticated user can use the /ajax/screenshot.php endpoint to leak files from the system or use PHP wrappers. This is fixed in version 2.0.2.

AI-Powered Analysis

AILast updated: 08/12/2025, 01:03:58 UTC

Technical Analysis

CVE-2025-54780 is a high-severity vulnerability affecting versions of the glpi-screenshot-plugin prior to 2.0.2. This plugin, developed by cconard96, integrates with GLPI (an open-source IT asset management and service desk software) to allow users to capture screenshots or screen recordings directly within the GLPI interface. The vulnerability is categorized under CWE-73: External Control of File Name or Path. Specifically, authenticated users can exploit the /ajax/screenshot.php endpoint to perform unauthorized file disclosure by manipulating file paths or leveraging PHP wrappers. This flaw allows attackers to read arbitrary files on the server hosting the plugin, potentially exposing sensitive configuration files, credentials, or other critical data. The vulnerability does not require user interaction beyond authentication, and it can be exploited remotely over the network (AV:N). The CVSS v3.1 base score is 7.7, reflecting high severity due to the high impact on confidentiality (C:H), no impact on integrity or availability, low attack complexity (AC:L), and the requirement for low privileges (PR:L). The vulnerability has been addressed in version 2.0.2 of the plugin, but no known exploits are currently reported in the wild. The flaw's exploitation scope is significant because it can lead to a complete breach of confidentiality within affected systems, potentially facilitating further attacks or data exfiltration.

Potential Impact

For European organizations using GLPI with the vulnerable glpi-screenshot-plugin versions, this vulnerability poses a significant risk to the confidentiality of sensitive data. Organizations in sectors such as government, finance, healthcare, and critical infrastructure that rely on GLPI for IT asset management and service desk operations could have sensitive internal documents, credentials, or configuration files exposed if attackers gain authenticated access. The ability to leak arbitrary files could facilitate lateral movement within networks or enable attackers to gather intelligence for more sophisticated attacks. Given the plugin’s integration with GLPI, which is widely used in Europe, the risk is amplified in environments where user authentication controls are weak or where multiple users have access to the GLPI interface. The vulnerability does not affect system integrity or availability directly but can undermine trust in IT management systems and lead to regulatory compliance issues under GDPR if personal or sensitive data is leaked.

Mitigation Recommendations

European organizations should immediately verify the version of the glpi-screenshot-plugin deployed in their GLPI environments and upgrade to version 2.0.2 or later where the vulnerability is patched. Additionally, organizations should enforce strict access controls and limit plugin usage to trusted and necessary users only. Implementing multi-factor authentication (MFA) for GLPI access can reduce the risk of unauthorized exploitation. Network segmentation should be applied to restrict access to GLPI servers from untrusted networks. Regularly auditing GLPI logs for unusual access patterns to the /ajax/screenshot.php endpoint can help detect exploitation attempts. Organizations should also consider disabling the screenshot plugin if it is not essential to their operations. Finally, applying web application firewalls (WAFs) with custom rules to detect and block suspicious path traversal or PHP wrapper usage attempts can provide an additional layer of defense.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-07-29T16:50:28.391Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 689154aead5a09ad00e467ec

Added to database: 8/5/2025, 12:47:42 AM

Last enriched: 8/12/2025, 1:03:58 AM

Last updated: 8/25/2025, 11:13:51 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats