Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66417: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

0
High
VulnerabilityCVE-2025-66417cvecve-2025-66417cwe-89
Published: Thu Jan 15 2026 (01/15/2026, 16:25:03 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

GLPI is a free asset and IT management software package. From 11.0.0, < 11.0.3, an unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 11.0.3.

AI-Powered Analysis

AILast updated: 01/15/2026, 16:38:57 UTC

Technical Analysis

CVE-2025-66417 is a SQL injection vulnerability classified under CWE-89 that affects the GLPI asset and IT management software. Specifically, versions from 11.0.0 up to but not including 11.0.3 contain a flaw in the inventory endpoint that allows an unauthenticated attacker to inject SQL commands. This occurs due to improper neutralization of special elements in SQL queries, enabling the attacker to manipulate backend database queries. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. Exploitation could lead to unauthorized disclosure of sensitive information stored in GLPI's database, such as asset inventories, user data, and configuration details. Although no integrity or availability impact is indicated, the confidentiality breach alone is critical given the nature of the data managed by GLPI. The vulnerability was publicly disclosed in January 2026 and has a CVSS v3.1 score of 7.5, reflecting its high severity. The vendor addressed the issue in GLPI version 11.0.3, urging users to upgrade promptly. No public exploit code or active exploitation has been reported yet, but the vulnerability's characteristics make it a prime target for attackers seeking to gather intelligence or prepare for further attacks.

Potential Impact

For European organizations, the impact of CVE-2025-66417 is significant due to GLPI's widespread use in IT asset management and service desks across public administrations, educational institutions, and private enterprises. Successful exploitation could lead to unauthorized access to sensitive asset inventories, user credentials, and configuration data, potentially facilitating further attacks such as lateral movement or targeted espionage. The breach of confidentiality could undermine compliance with GDPR and other data protection regulations, resulting in legal and financial repercussions. While the vulnerability does not directly affect system integrity or availability, the exposure of critical IT management data could disrupt operational security and trust. Organizations relying on vulnerable GLPI versions face increased risk of data leakage and should consider the threat a priority. The lack of authentication requirement and ease of exploitation further elevate the threat level, especially in environments where GLPI is accessible from external networks.

Mitigation Recommendations

1. Immediate upgrade to GLPI version 11.0.3 or later to apply the official patch addressing the SQL injection vulnerability. 2. Restrict network access to the GLPI inventory endpoint by implementing firewall rules or network segmentation to limit exposure to trusted users and systems only. 3. Employ Web Application Firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting GLPI endpoints. 4. Conduct thorough logging and monitoring of GLPI access logs to identify unusual query patterns or repeated access attempts to the inventory endpoint. 5. Perform regular security assessments and penetration testing focusing on GLPI installations to detect any residual vulnerabilities or misconfigurations. 6. Educate IT and security teams about the vulnerability and ensure rapid incident response capabilities in case of suspected exploitation. 7. If immediate patching is not feasible, consider temporarily disabling or restricting the inventory endpoint functionality until the update can be applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-28T23:33:56.366Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696916c94c611209ad420d9e

Added to database: 1/15/2026, 4:33:13 PM

Last enriched: 1/15/2026, 4:38:57 PM

Last updated: 1/16/2026, 9:27:53 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats