Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64520: CWE-862: Missing Authorization in glpi-project glpi

0
Medium
VulnerabilityCVE-2025-64520cvecve-2025-64520cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 21:59:02 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a free asset and IT management software package. Starting in version 9.1.0 and prior to version 10.0.21, an unauthorized user with an API access can read all knowledge base entries. Users should upgrade to 10.0.21 to receive a patch.

AI-Powered Analysis

AILast updated: 12/16/2025, 22:16:36 UTC

Technical Analysis

CVE-2025-64520 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the GLPI software, versions from 9.1.0 up to 10.0.21. GLPI is widely used for IT asset and service management. The vulnerability arises because the software fails to enforce proper authorization checks on API endpoints that serve knowledge base entries. As a result, an attacker with API access but without proper privileges can retrieve all knowledge base content, which may contain sensitive operational or security-related information. The vulnerability does not allow modification or deletion of data, nor does it affect system availability. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) indicates that the attack can be performed remotely over the network with low privileges and no user interaction, leading to a high confidentiality impact. The flaw was reserved in November 2025 and published in December 2025, with no known exploits in the wild at the time of publication. The recommended mitigation is to upgrade to GLPI version 10.0.21 or later, where the authorization checks have been properly implemented to restrict unauthorized API access.

Potential Impact

For European organizations, this vulnerability poses a significant risk of unauthorized disclosure of sensitive knowledge base information, which may include internal procedures, security configurations, or incident response guidelines. Such information leakage can aid attackers in planning further attacks or exploiting other vulnerabilities. Organizations in sectors like government, finance, healthcare, and critical infrastructure that use GLPI for IT management are particularly at risk. The confidentiality breach could lead to regulatory compliance issues under GDPR if personal or sensitive data is exposed. Although the vulnerability does not allow data modification or service disruption, the exposure of internal knowledge can indirectly weaken security posture and increase the likelihood of subsequent attacks. The ease of exploitation via network API access with low privileges increases the threat level, especially in environments where API access controls are lax or where attackers can gain initial footholds with limited credentials.

Mitigation Recommendations

European organizations should immediately verify their GLPI version and plan an upgrade to version 10.0.21 or later, where the vulnerability is patched. Until the upgrade is applied, organizations should restrict API access to trusted users and networks, implement strict network segmentation, and monitor API usage logs for suspicious activity. Employing Web Application Firewalls (WAFs) to detect and block unauthorized API requests can provide interim protection. Additionally, reviewing and tightening API authentication and authorization policies is critical to prevent unauthorized access. Organizations should also conduct audits of knowledge base content to assess sensitivity and consider encrypting or restricting access to particularly sensitive entries. Regular vulnerability scanning and penetration testing focusing on API endpoints can help detect similar authorization issues proactively.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T21:15:39.400Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6941d6c9b8ff87d8f9416195

Added to database: 12/16/2025, 10:01:45 PM

Last enriched: 12/16/2025, 10:16:36 PM

Last updated: 12/17/2025, 3:42:33 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats