CVE-2025-59935: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.21, an unauthenticated user can store an XSS payload through the inventory endpoint. Users should upgrade to 10.0.21 to receive a patch.
AI Analysis
Technical Summary
CVE-2025-59935 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting GLPI, a widely used open-source IT asset and service management software. The vulnerability exists in versions 10.0.0 through 10.0.20 and allows an unauthenticated attacker to inject malicious JavaScript payloads through the inventory endpoint. This improper neutralization of input during web page generation enables the attacker to store a persistent XSS payload that executes when a legitimate user accesses the affected page. The vulnerability does not require any privileges or authentication, increasing its risk profile. However, user interaction is necessary to trigger the malicious script execution. The impact primarily affects confidentiality, as attackers may steal session cookies, perform actions on behalf of users, or conduct phishing attacks within the context of the GLPI web application. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. No public exploits have been reported yet, but the availability of the vulnerability in a popular ITSM tool makes it a potential target for attackers. The vendor has addressed the issue in version 10.0.21, and users are strongly advised to upgrade. The vulnerability highlights the importance of proper input validation and output encoding in web applications to prevent XSS attacks.
Potential Impact
For European organizations, the exploitation of CVE-2025-59935 could lead to unauthorized disclosure of sensitive IT asset management data, session hijacking, and potential lateral movement within internal networks. Since GLPI is often used to manage critical IT infrastructure and assets, attackers leveraging this XSS flaw could gain footholds or escalate privileges indirectly by targeting administrative users. The vulnerability's unauthenticated nature increases the attack surface, allowing external threat actors to attempt exploitation without prior access. This could impact confidentiality and trust in IT management systems, potentially disrupting IT operations or leading to data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if exploited. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge rapidly after public disclosure.
Mitigation Recommendations
The primary mitigation is to upgrade GLPI installations to version 10.0.21 or later, where the vulnerability is patched. Organizations should also implement strict input validation and output encoding on all user-supplied data, particularly on the inventory endpoint, to prevent injection of malicious scripts. Deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting GLPI can provide additional protection. Monitoring web server logs and application behavior for unusual requests or script injections is recommended to detect attempted exploitation. Educating users about the risks of clicking on suspicious links or interacting with untrusted content within GLPI can reduce the impact of successful XSS attacks. Regular security assessments and penetration testing of GLPI deployments should be conducted to identify and remediate similar vulnerabilities proactively. Finally, organizations should maintain an incident response plan tailored to web application attacks to respond swiftly if exploitation occurs.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium
CVE-2025-59935: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi
Description
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.21, an unauthenticated user can store an XSS payload through the inventory endpoint. Users should upgrade to 10.0.21 to receive a patch.
AI-Powered Analysis
Technical Analysis
CVE-2025-59935 is a cross-site scripting (XSS) vulnerability classified under CWE-79 affecting GLPI, a widely used open-source IT asset and service management software. The vulnerability exists in versions 10.0.0 through 10.0.20 and allows an unauthenticated attacker to inject malicious JavaScript payloads through the inventory endpoint. This improper neutralization of input during web page generation enables the attacker to store a persistent XSS payload that executes when a legitimate user accesses the affected page. The vulnerability does not require any privileges or authentication, increasing its risk profile. However, user interaction is necessary to trigger the malicious script execution. The impact primarily affects confidentiality, as attackers may steal session cookies, perform actions on behalf of users, or conduct phishing attacks within the context of the GLPI web application. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. No public exploits have been reported yet, but the availability of the vulnerability in a popular ITSM tool makes it a potential target for attackers. The vendor has addressed the issue in version 10.0.21, and users are strongly advised to upgrade. The vulnerability highlights the importance of proper input validation and output encoding in web applications to prevent XSS attacks.
Potential Impact
For European organizations, the exploitation of CVE-2025-59935 could lead to unauthorized disclosure of sensitive IT asset management data, session hijacking, and potential lateral movement within internal networks. Since GLPI is often used to manage critical IT infrastructure and assets, attackers leveraging this XSS flaw could gain footholds or escalate privileges indirectly by targeting administrative users. The vulnerability's unauthenticated nature increases the attack surface, allowing external threat actors to attempt exploitation without prior access. This could impact confidentiality and trust in IT management systems, potentially disrupting IT operations or leading to data breaches. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, may face compliance risks if exploited. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as exploit code could emerge rapidly after public disclosure.
Mitigation Recommendations
The primary mitigation is to upgrade GLPI installations to version 10.0.21 or later, where the vulnerability is patched. Organizations should also implement strict input validation and output encoding on all user-supplied data, particularly on the inventory endpoint, to prevent injection of malicious scripts. Deploying web application firewalls (WAFs) with rules to detect and block XSS payloads targeting GLPI can provide additional protection. Monitoring web server logs and application behavior for unusual requests or script injections is recommended to detect attempted exploitation. Educating users about the risks of clicking on suspicious links or interacting with untrusted content within GLPI can reduce the impact of successful XSS attacks. Regular security assessments and penetration testing of GLPI deployments should be conducted to identify and remediate similar vulnerabilities proactively. Finally, organizations should maintain an incident response plan tailored to web application attacks to respond swiftly if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-23T14:33:49.505Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69418d769050fe8508ffb301
Added to database: 12/16/2025, 4:48:54 PM
Last enriched: 12/16/2025, 4:56:42 PM
Last updated: 12/18/2025, 11:29:29 AM
Views: 12
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
113,000 Impacted by Data Breach at Virginia Mental Health Authority
MediumCVE-2025-14364: CWE-862 Missing Authorization in kraftplugins Demo Importer Plus
HighCVE-2025-13730: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in daggerhart OpenID Connect Generic Client
MediumCVE-2025-13641: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in smub Photo Gallery, Sliders, Proofing and Themes – NextGEN Gallery
HighCVE-2025-64997: CWE-280: Improper Handling of Insufficient Permissions or Privileges in Checkmk GmbH Checkmk
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.