CVE-2025-24799

GLPI allows unauthenticated SQL injection through the inventory endpoint

Basic Information

CVE State
PUBLISHED
Reserved Date
January 23, 2025
Published Date
March 18, 2025
Last Updated
March 18, 2025
Vendor
glpi-project
Product
glpi
Description
GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18.
Tags
nuclei_scanner

CVSS Scores

CVSS v3.1

7.5 - HIGH

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS Score

Score
52.36% (Percentile: 97.76%) as of 2025-06-09

SSVC Information

Exploitation
none
Automatable
Yes
Technical Impact
partial

Exploit Status

Exploited in the Wild
Yes (2025-05-12 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2025-04-15 04:57:39 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-05-12 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

MatheuZSecurity/Exploit-CVE-2025-24799

Type: github • Created: 2025-04-15 04:57:39 UTC • Stars: 15

CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection

MuhammadWaseem29/CVE-2025-24799

Type: github • Created: 2025-04-03 16:55:11 UTC • Stars: 24

realcodeb0ss/CVE-2025-24799-PoC

Type: github • Created: 2025-03-31 15:48:12 UTC • Stars: 0

Timeline

  • CVE ID Reserved

  • CVE Published to Public

  • Proof of Concept Exploit Available

  • Detected by Nuclei

  • Added to KEVIntel