Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25590: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in glpi-project glpi-inventory-plugin

0
Medium
VulnerabilityCVE-2026-25590cvecve-2026-25590cwe-79
Published: Tue Mar 03 2026 (03/03/2026, 22:14:01 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi-inventory-plugin

Description

The GLPI Inventory Plugin handles network discovery, inventory, software deployment, and data collection for GLPI agents. Prior to 1.6.6, there is a reflected XSS vulnerability in task jobs. This vulnerability is fixed in 1.6.6.

AI-Powered Analysis

AILast updated: 03/03/2026, 22:48:08 UTC

Technical Analysis

CVE-2026-25590 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the GLPI Inventory Plugin, a component of the GLPI project used for network discovery, inventory management, software deployment, and data collection from GLPI agents. The vulnerability exists in versions prior to 1.6.6 and is categorized under CWE-79, which involves improper neutralization of input during web page generation. Specifically, the flaw occurs in the handling of task jobs where user-supplied input is not properly sanitized or encoded before being reflected in the web interface, enabling attackers to inject malicious JavaScript code. The CVSS v3.1 base score is 4.5, indicating a medium severity level. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), but demands high privileges (PR:H) and user interaction (UI:R). The vulnerability affects confidentiality (C:H) but does not impact integrity or availability. Exploitation requires an authenticated user with sufficient privileges to trigger the reflected XSS, which could lead to session hijacking, credential theft, or other client-side attacks. The vulnerability was reserved in early February 2026 and published in March 2026, with no known exploits in the wild reported to date. The issue is resolved in GLPI Inventory Plugin version 1.6.6, and users are advised to upgrade promptly to mitigate risk.

Potential Impact

The primary impact of CVE-2026-25590 is on the confidentiality of data within organizations using the GLPI Inventory Plugin versions prior to 1.6.6. Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of an authenticated user's browser, potentially leading to session hijacking, theft of sensitive information, or unauthorized actions performed on behalf of the user. Since the vulnerability requires authenticated access with high privileges and user interaction, the attack surface is limited to insiders or attackers who have compromised credentials. However, in environments where GLPI is used for critical IT asset management and network inventory, such an attack could facilitate further lateral movement or data exfiltration. The reflected XSS does not affect system integrity or availability directly but can be a stepping stone for more complex attacks. Organizations worldwide relying on GLPI for IT management could face targeted attacks aiming to compromise administrative sessions or extract confidential inventory data, impacting operational security and compliance.

Mitigation Recommendations

To mitigate CVE-2026-25590, organizations should immediately upgrade the GLPI Inventory Plugin to version 1.6.6 or later, where the vulnerability is patched. In addition to patching, administrators should enforce the principle of least privilege by restricting access to the GLPI interface and limiting high-privilege accounts to trusted personnel only. Implementing Content Security Policy (CSP) headers can help reduce the impact of XSS by restricting the execution of unauthorized scripts. Regularly auditing user accounts and monitoring for suspicious activities can detect potential exploitation attempts. Web application firewalls (WAFs) configured to detect and block reflected XSS payloads may provide an additional layer of defense. Finally, educating users about the risks of clicking on untrusted links or interacting with suspicious content within the GLPI environment can reduce the likelihood of successful exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-03T01:02:46.716Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a761b1d1a09e29cb80d3f8

Added to database: 3/3/2026, 10:33:21 PM

Last enriched: 3/3/2026, 10:48:08 PM

Last updated: 3/4/2026, 7:18:51 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses