Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25936: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in glpi-project glpi

0
Medium
VulnerabilityCVE-2026-25936cvecve-2026-25936cwe-89
Published: Tue Mar 17 2026 (03/17/2026, 19:41:32 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

CVE-2026-25936 is a medium severity SQL injection vulnerability affecting GLPI versions from 11. 0. 0 up to but not including 11. 0. 6. An authenticated user can exploit this flaw to execute unauthorized SQL commands due to improper neutralization of special elements in SQL queries. This vulnerability does not require user interaction beyond authentication and has no known exploits in the wild as of now. The vulnerability impacts confidentiality by potentially exposing sensitive data but does not affect integrity or availability. The issue is fixed in version 11. 0.

AI-Powered Analysis

AILast updated: 03/17/2026, 20:13:48 UTC

Technical Analysis

CVE-2026-25936 identifies a SQL injection vulnerability in the GLPI IT asset and service management software, specifically in versions 11.0.0 through 11.0.5. The root cause is improper neutralization of special elements used in SQL commands (CWE-89), allowing an authenticated user to inject malicious SQL code. This flaw arises from insufficient input validation or sanitization of user-supplied data before incorporating it into SQL queries. Exploiting this vulnerability enables an attacker to execute unauthorized SQL commands on the backend database, potentially exposing sensitive information such as credentials, configuration details, or other stored data. The vulnerability does not require user interaction beyond authentication, and the attack complexity is low due to the lack of additional barriers. However, the attacker must have valid credentials, which limits exploitation to insiders or compromised accounts. The CVSS v3.1 score is 6.5 (medium severity), reflecting high confidentiality impact but no integrity or availability impact. The vulnerability was reserved in February 2026 and publicly disclosed in March 2026. The issue is resolved in GLPI version 11.0.6, which includes proper input validation and sanitization to prevent SQL injection. No known exploits have been reported in the wild, but the risk remains significant for organizations running vulnerable GLPI versions. Given GLPI's role in IT asset and service management, exploitation could lead to unauthorized data disclosure and potential lateral movement within networks.

Potential Impact

The primary impact of CVE-2026-25936 is the potential unauthorized disclosure of sensitive information stored within GLPI's backend database. This can include asset inventories, user credentials, configuration data, and other critical IT management information. Exposure of such data can facilitate further attacks, including privilege escalation, lateral movement, or targeted attacks against the organization's infrastructure. Although the vulnerability does not directly compromise data integrity or system availability, the confidentiality breach alone can have severe consequences, especially in environments managing sensitive or regulated data. Organizations relying on GLPI for IT asset and service management may face compliance violations, reputational damage, and operational risks if this vulnerability is exploited. Since exploitation requires authenticated access, the threat is heightened in environments with weak access controls or where user credentials are easily compromised. The absence of known exploits in the wild provides a window for remediation, but the medium severity score indicates that timely patching is critical to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2026-25936, organizations should immediately upgrade GLPI installations to version 11.0.6 or later, where the vulnerability is fixed. If immediate upgrading is not feasible, implement strict access controls to limit authenticated user privileges to the minimum necessary, reducing the risk of exploitation by insiders or compromised accounts. Conduct thorough audits of user accounts and credentials to identify and disable any unnecessary or suspicious accounts. Employ network segmentation to isolate GLPI servers from less trusted network zones, minimizing exposure. Enable detailed logging and monitoring of GLPI database queries and user activities to detect anomalous behavior indicative of SQL injection attempts. Additionally, consider deploying web application firewalls (WAFs) with rules tailored to detect and block SQL injection payloads targeting GLPI. Regularly review and update security policies related to authentication and authorization to strengthen defenses. Finally, educate users and administrators about the risks of SQL injection and the importance of credential security to reduce the likelihood of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T16:22:17.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9b25d771bdb1749d33705

Added to database: 3/17/2026, 7:58:21 PM

Last enriched: 3/17/2026, 8:13:48 PM

Last updated: 3/18/2026, 6:53:19 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses