CVE-2025-21626

GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

History

04 Mar 2025, 13:49

Type Values Removed Values Added
First Time Glpi-project
Glpi-project glpi
References () https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 - () https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77 - Vendor Advisory
References () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - () https://github.com/glpi-project/glpi/releases/tag/10.0.18 - Release Notes
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

25 Feb 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-25 16:15

Updated : 2025-03-04 13:49


NVD link : CVE-2025-21626

Mitre link : CVE-2025-21626


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor