CVE-2026-22044: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
GLPI is a free asset and IT management software package. From version 0.85 to before 10.0.23, an authenticated user can perform a SQL injection. This issue has been patched in version 10.0.23.
AI Analysis
Technical Summary
CVE-2026-22044 is an SQL injection vulnerability classified under CWE-89, found in the GLPI project, a widely used free and open-source IT asset and service management software. The flaw exists in versions starting from 0.85 up to before 10.0.23, allowing an authenticated user to inject malicious SQL commands due to improper sanitization of special characters in SQL queries. This vulnerability enables an attacker with valid credentials to extract sensitive information from the database, compromising confidentiality without affecting data integrity or availability. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with an attack vector of network, low attack complexity, and requiring privileges (authenticated user). No user interaction is needed beyond authentication. The vulnerability was publicly disclosed on February 4, 2026, and patched in GLPI version 10.0.23. Although no active exploitation has been reported, the potential for data leakage in environments managing critical IT assets and services is significant. The issue highlights the importance of proper input validation and parameterized queries in preventing SQL injection attacks.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on GLPI for IT asset management, service desk operations, and configuration management databases. Exploitation could lead to unauthorized disclosure of sensitive information such as user credentials, configuration details, and asset inventories, which could facilitate further attacks or compliance violations under GDPR. Since the vulnerability requires authentication, insider threats or compromised accounts pose a significant risk. The confidentiality breach could undermine trust, disrupt IT operations, and result in regulatory penalties. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The absence of integrity and availability impact limits the scope to data exposure rather than system disruption or data manipulation.
Mitigation Recommendations
European organizations should immediately upgrade GLPI installations to version 10.0.23 or later, where the vulnerability is patched. Until the upgrade can be performed, restrict GLPI access to trusted users and networks, enforce strong authentication mechanisms including multi-factor authentication, and monitor logs for unusual database query patterns indicative of SQL injection attempts. Implement web application firewalls (WAFs) with rules targeting SQL injection signatures specific to GLPI. Conduct regular security audits and code reviews for custom plugins or integrations that might reintroduce similar vulnerabilities. Educate administrators and users about the risks of credential compromise and enforce least privilege principles to minimize the impact of potential exploitation. Finally, ensure backups are current and tested to enable recovery if needed.
Affected Countries
France, Germany, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-22044: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi
Description
GLPI is a free asset and IT management software package. From version 0.85 to before 10.0.23, an authenticated user can perform a SQL injection. This issue has been patched in version 10.0.23.
AI-Powered Analysis
Technical Analysis
CVE-2026-22044 is an SQL injection vulnerability classified under CWE-89, found in the GLPI project, a widely used free and open-source IT asset and service management software. The flaw exists in versions starting from 0.85 up to before 10.0.23, allowing an authenticated user to inject malicious SQL commands due to improper sanitization of special characters in SQL queries. This vulnerability enables an attacker with valid credentials to extract sensitive information from the database, compromising confidentiality without affecting data integrity or availability. The CVSS v3.1 base score is 6.5, reflecting a medium severity level, with an attack vector of network, low attack complexity, and requiring privileges (authenticated user). No user interaction is needed beyond authentication. The vulnerability was publicly disclosed on February 4, 2026, and patched in GLPI version 10.0.23. Although no active exploitation has been reported, the potential for data leakage in environments managing critical IT assets and services is significant. The issue highlights the importance of proper input validation and parameterized queries in preventing SQL injection attacks.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on GLPI for IT asset management, service desk operations, and configuration management databases. Exploitation could lead to unauthorized disclosure of sensitive information such as user credentials, configuration details, and asset inventories, which could facilitate further attacks or compliance violations under GDPR. Since the vulnerability requires authentication, insider threats or compromised accounts pose a significant risk. The confidentiality breach could undermine trust, disrupt IT operations, and result in regulatory penalties. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and government, face heightened risks. The absence of integrity and availability impact limits the scope to data exposure rather than system disruption or data manipulation.
Mitigation Recommendations
European organizations should immediately upgrade GLPI installations to version 10.0.23 or later, where the vulnerability is patched. Until the upgrade can be performed, restrict GLPI access to trusted users and networks, enforce strong authentication mechanisms including multi-factor authentication, and monitor logs for unusual database query patterns indicative of SQL injection attempts. Implement web application firewalls (WAFs) with rules targeting SQL injection signatures specific to GLPI. Conduct regular security audits and code reviews for custom plugins or integrations that might reintroduce similar vulnerabilities. Educate administrators and users about the risks of credential compromise and enforce least privilege principles to minimize the impact of potential exploitation. Finally, ensure backups are current and tested to enable recovery if needed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T22:30:38.720Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69838221f9fa50a62f9dc5e6
Added to database: 2/4/2026, 5:30:09 PM
Last enriched: 2/4/2026, 5:44:49 PM
Last updated: 2/6/2026, 4:45:31 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumCVE-2026-2057: SQL Injection in SourceCodester Medical Center Portal Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.