Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-21626— GLPI vulnerable to exposure of sensitive information in the `status.php` endpoint

CVSS 5.8 · Medium EPSS 0.23% · P46
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-21626

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
GLPI vulnerable to exposure of sensitive information in the `status.php` endpoint
Source: NVD (National Vulnerability Database)
Vulnerability Description
GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)
Vulnerability Title
GLPI 信息泄露漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
GLPI是GLPI开源的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI 0.71至10.0.18之前版本存在信息泄露漏洞,该漏洞源于匿名用户可从status.php端点获取敏感信息。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
glpi-projectglpi >= 0.71, < 10.0.18 -

II. Public POCs for CVE-2025-21626

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-21626

登录查看更多情报信息。

Same Patch Batch · glpi-project · 2025-02-25 · 5 CVEs total

CVE-2025-251926.5 MEDIUMGLPI allows unauthorized access to debug mode
CVE-2025-216276.5 MEDIUMGLPI Cross-site Scripting vulnerability
CVE-2025-23046GLPI vulnerable to unauthorized authentication by email using the OAuthIMAP plugin
CVE-2025-23024GLPI: Plugins are disabled accessing one page

IV. Related Vulnerabilities

V. Comments for CVE-2025-21626

No comments yet


Leave a comment