Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| glpi-project | glpi | >= 0.78, < 10.0.19 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-53111 | 6.5 MEDIUM | GLPI exposes data to non-allowed users |
| CVE-2025-53008 | 6.5 MEDIUM | GLPI's MailCollector Receiver is vulnerable to credential exfiltration |
| CVE-2025-52897 | 6.5 MEDIUM | GLPI is vulnerable to XSS and open redirection attacks through planning feature |
| CVE-2025-53112 | 4.3 MEDIUM | GLPI's incomprehensive permission checks can lead to data removal from allowed users |
| CVE-2025-52567 | 3.5 LOW | GLPI has overly permissive URL verification |
| CVE-2025-53113 | 2.7 LOW | GLPI technicians can access unauthorized information through external links |
No comments yet