HomeGlpi-ProjectCVE-2025-21626

CVE-2025-21626

MEDIUM
5.8CVSS
Published: 2025-02-25
Updated: 2025-03-04
AI Analysis

Description

GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
changed
Confidentiality
low
Integrity
none
Availability
none
Weaknesses
CWE-200NVD-CWE-noinfo

Metadata

Primary Vendor
GLPI-PROJECT
Published
2/25/2025
Last Modified
3/4/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

glpi-project : glpi

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-21626 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com