GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.
References
Link | Resource |
---|---|
https://github.com/glpi-project/glpi/releases/tag/10.0.18 | Release Notes |
https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 | Vendor Advisory |
Configurations
History
04 Mar 2025, 13:49
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo | |
References | () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - Release Notes | |
References | () https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 - Vendor Advisory | |
Summary |
|
|
First Time |
Glpi-project glpi
Glpi-project |
|
CPE | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* |
25 Feb 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-25 16:15
Updated : 2025-03-04 13:49
NVD link : CVE-2025-21626
Mitre link : CVE-2025-21626
CVE.ORG link : CVE-2025-21626
JSON object : View
Products Affected
glpi-project
- glpi
CWE