Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| glpi-project | glpi | >= 0.65, < 10.0.19 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-53111 | 6.5 MEDIUM | GLPI exposes data to non-allowed users |
| CVE-2025-53008 | 6.5 MEDIUM | GLPI's MailCollector Receiver is vulnerable to credential exfiltration |
| CVE-2025-52897 | 6.5 MEDIUM | GLPI is vulnerable to XSS and open redirection attacks through planning feature |
| CVE-2025-53357 | 5.4 MEDIUM | GLPI permits reservation modification by unauthorized users |
| CVE-2025-53112 | 4.3 MEDIUM | GLPI's incomprehensive permission checks can lead to data removal from allowed users |
| CVE-2025-52567 | 3.5 LOW | GLPI has overly permissive URL verification |
No comments yet