CVE-2025-21626

GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

04 Mar 2025, 13:49

Type Values Removed Values Added
CWE NVD-CWE-noinfo
References () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - Release Notes
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 - () https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 - Vendor Advisory
Summary
  • (es) GLPI es un paquete de software gratuito de gestión de activos y TI. A partir de la versión 0.71 y antes de la versión 10.0.18, un usuario anónimo puede obtener información confidencial del endpoint `status.php`. La versión 10.0.18 contiene una solución para el problema. Hay algunos workarounds disponibles. Se puede eliminar el archivo `status.php`, restringir su acceso o eliminar cualquier valor confidencial del campo `name` de los directorios LDAP activos, los proveedores de autenticación de servidores de correo y los receptores de correo.
First Time Glpi-project glpi
Glpi-project
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

25 Feb 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-25 16:15

Updated : 2025-03-04 13:49


NVD link : CVE-2025-21626

Mitre link : CVE-2025-21626

CVE.ORG link : CVE-2025-21626


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

NVD-CWE-noinfo