CVE-2026-22248: CWE-502: Deserialization of Untrusted Data in glpi-project glpi
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.
AI Analysis
Technical Summary
CVE-2026-22248 is a deserialization vulnerability classified under CWE-502 found in the GLPI software, versions 11.0.0 through 11.0.4. GLPI is widely used for IT asset management, ITIL service desk operations, license tracking, and software auditing. The vulnerability arises from unsafe PHP object instantiation during the handling of uploaded files by authenticated technician users. Specifically, the software does not properly validate or sanitize serialized data embedded within uploaded files, allowing attackers with technician-level privileges to craft malicious payloads that, when deserialized, execute arbitrary code on the server. This can lead to complete system compromise, including unauthorized access to sensitive data, modification or deletion of records, and disruption of service availability. The vulnerability requires an attacker to have authenticated access with technician privileges, which limits exposure but still poses a significant risk in environments where such access is granted to multiple users or where credential compromise is possible. The CVSS v3.1 base score is 8.1, indicating high severity with network attack vector, high privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. The issue was fixed in GLPI version 11.0.5, which implements proper validation and safe deserialization practices to prevent exploitation. No public exploits are currently known, but the vulnerability's nature and impact make it a critical patch priority for affected organizations.
Potential Impact
The impact of CVE-2026-22248 is severe for organizations using GLPI versions prior to 11.0.5. Successful exploitation allows an authenticated technician user to execute arbitrary code on the server, potentially leading to full system compromise. This includes unauthorized access to sensitive IT asset data, service desk tickets, license information, and audit logs. Attackers could manipulate or delete critical records, disrupt IT service management processes, and potentially pivot to other internal systems. The vulnerability compromises confidentiality, integrity, and availability simultaneously. Given GLPI's role in managing IT infrastructure and services, such a breach could severely disrupt organizational operations, lead to data breaches, and cause compliance violations. Although exploitation requires authenticated access, the risk is heightened in environments with many technician users or weak credential management. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching due to the vulnerability's high severity and potential impact.
Mitigation Recommendations
To mitigate CVE-2026-22248, organizations should immediately upgrade GLPI installations to version 11.0.5 or later, where the vulnerability is fixed. Until the upgrade can be performed, restrict technician user privileges to the minimum necessary and monitor for suspicious file uploads or unusual activity from technician accounts. Implement strong authentication controls, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit user permissions and remove unnecessary technician accounts. Employ network segmentation and web application firewalls (WAFs) to limit exposure of GLPI servers to untrusted networks. Additionally, review and harden PHP configuration to disable unsafe deserialization functions if possible. Maintain comprehensive logging and alerting on file upload activities and deserialization errors to detect potential exploitation attempts early. Finally, educate administrators and users about the risks of deserialization vulnerabilities and the importance of timely patching.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Japan, Brazil, India
CVE-2026-22248: CWE-502: Deserialization of Untrusted Data in glpi-project glpi
Description
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-22248 is a deserialization vulnerability classified under CWE-502 found in the GLPI software, versions 11.0.0 through 11.0.4. GLPI is widely used for IT asset management, ITIL service desk operations, license tracking, and software auditing. The vulnerability arises from unsafe PHP object instantiation during the handling of uploaded files by authenticated technician users. Specifically, the software does not properly validate or sanitize serialized data embedded within uploaded files, allowing attackers with technician-level privileges to craft malicious payloads that, when deserialized, execute arbitrary code on the server. This can lead to complete system compromise, including unauthorized access to sensitive data, modification or deletion of records, and disruption of service availability. The vulnerability requires an attacker to have authenticated access with technician privileges, which limits exposure but still poses a significant risk in environments where such access is granted to multiple users or where credential compromise is possible. The CVSS v3.1 base score is 8.1, indicating high severity with network attack vector, high privileges required, no user interaction needed, and full impact on confidentiality, integrity, and availability. The issue was fixed in GLPI version 11.0.5, which implements proper validation and safe deserialization practices to prevent exploitation. No public exploits are currently known, but the vulnerability's nature and impact make it a critical patch priority for affected organizations.
Potential Impact
The impact of CVE-2026-22248 is severe for organizations using GLPI versions prior to 11.0.5. Successful exploitation allows an authenticated technician user to execute arbitrary code on the server, potentially leading to full system compromise. This includes unauthorized access to sensitive IT asset data, service desk tickets, license information, and audit logs. Attackers could manipulate or delete critical records, disrupt IT service management processes, and potentially pivot to other internal systems. The vulnerability compromises confidentiality, integrity, and availability simultaneously. Given GLPI's role in managing IT infrastructure and services, such a breach could severely disrupt organizational operations, lead to data breaches, and cause compliance violations. Although exploitation requires authenticated access, the risk is heightened in environments with many technician users or weak credential management. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency of patching due to the vulnerability's high severity and potential impact.
Mitigation Recommendations
To mitigate CVE-2026-22248, organizations should immediately upgrade GLPI installations to version 11.0.5 or later, where the vulnerability is fixed. Until the upgrade can be performed, restrict technician user privileges to the minimum necessary and monitor for suspicious file uploads or unusual activity from technician accounts. Implement strong authentication controls, including multi-factor authentication, to reduce the risk of credential compromise. Regularly audit user permissions and remove unnecessary technician accounts. Employ network segmentation and web application firewalls (WAFs) to limit exposure of GLPI servers to untrusted networks. Additionally, review and harden PHP configuration to disable unsafe deserialization functions if possible. Maintain comprehensive logging and alerting on file upload activities and deserialization errors to detect potential exploitation attempts early. Finally, educate administrators and users about the risks of deserialization vulnerabilities and the importance of timely patching.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-07T05:19:12.921Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69b1917d2f860ef9432c8e3f
Added to database: 3/11/2026, 3:59:57 PM
Last enriched: 3/18/2026, 7:24:05 PM
Last updated: 4/28/2026, 7:28:27 AM
Views: 92
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.