Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25937: CWE-287: Improper Authentication in glpi-project glpi

0
Medium
VulnerabilityCVE-2026-25937cvecve-2026-25937cwe-287
Published: Tue Mar 17 2026 (03/17/2026, 23:16:38 UTC)
Source: CVE Database V5
Vendor/Project: glpi-project
Product: glpi

Description

CVE-2026-25937 is an improper authentication vulnerability in GLPI versions 11. 0. 0 through 11. 0. 5 that allows an attacker with valid user credentials to bypass multi-factor authentication (MFA) and access the victim's account. This flaw affects GLPI, a widely used open-source IT and asset management software. The vulnerability does not require user interaction beyond credential knowledge and can lead to full compromise of confidentiality and integrity of the affected accounts. The issue was fixed in version 11. 0. 6.

AI-Powered Analysis

AILast updated: 03/17/2026, 23:42:48 UTC

Technical Analysis

CVE-2026-25937 is classified under CWE-287 (Improper Authentication) and affects GLPI, an open-source asset and IT management software. The vulnerability exists in GLPI versions starting from 11.0.0 up to but not including 11.0.6. It allows a malicious actor who already possesses valid user credentials to bypass the multi-factor authentication mechanism implemented by GLPI. This bypass effectively negates the additional security layer provided by MFA, enabling attackers to gain unauthorized access to user accounts without needing the second authentication factor. The vulnerability does not require user interaction beyond credential possession and can be exploited remotely over the network (AV:N). The attack complexity is low (AC:L), but it requires the attacker to have high privileges or knowledge of valid credentials (PR:H). The vulnerability impacts confidentiality and integrity severely (C:H/I:H), but does not affect availability (A:N). The flaw was addressed and fixed in GLPI version 11.0.6. No public exploits have been reported yet, but the risk remains significant given the potential for account takeover and data compromise in environments relying on GLPI for IT asset management.

Potential Impact

The primary impact of this vulnerability is the compromise of user accounts despite the presence of MFA, which is typically considered a strong security control. Attackers who obtain or guess valid credentials can bypass MFA and gain unauthorized access to sensitive IT asset and management data stored within GLPI. This can lead to unauthorized disclosure of confidential information, manipulation or deletion of asset records, and potential lateral movement within an organization's network. Since GLPI is often used by IT departments to manage critical infrastructure and assets, exploitation could disrupt asset tracking, incident response, and IT operations. Organizations relying on GLPI for compliance or operational management may face regulatory and operational risks if this vulnerability is exploited. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often target MFA bypass vulnerabilities.

Mitigation Recommendations

Organizations should immediately upgrade all GLPI installations to version 11.0.6 or later, where the vulnerability has been patched. In environments where immediate upgrade is not feasible, organizations should enforce strict credential hygiene, including mandatory password resets for all GLPI users and monitoring for unusual login activity. Implement network-level protections such as IP whitelisting or VPN access to restrict GLPI access to trusted networks. Additionally, consider deploying anomaly detection systems to identify suspicious authentication attempts. Review and tighten user privilege assignments within GLPI to minimize the impact of compromised accounts. Regularly audit GLPI logs for signs of unauthorized access attempts. Finally, educate users on the importance of protecting their credentials and consider integrating additional layers of security beyond GLPI's native MFA where possible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T16:22:17.786Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b9e397771bdb1749e6bc5c

Added to database: 3/17/2026, 11:28:23 PM

Last enriched: 3/17/2026, 11:42:48 PM

Last updated: 3/18/2026, 2:54:53 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses