CVE-2025-23046

7.5 HIGH

📋 TL;DR

This vulnerability allows authentication bypass in GLPI when using OauthIMAP plugin with Mail servers authentication. Anyone can connect using any username that already has Oauth authorization established. Affects GLPI installations with OauthIMAP plugin configured for Mail servers authentication.

💻 Affected Systems

Products:
  • GLPI
Versions: 9.5.0 to 10.0.17
Operating Systems: All platforms running GLPI
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when OauthIMAP plugin is configured for Mail servers authentication provider

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized users gain access to GLPI with privileges of any user who has previously authorized Oauth, potentially leading to data theft, privilege escalation, or system compromise.

🟠

Likely Case

Attackers access GLPI with user accounts they shouldn't have access to, potentially viewing sensitive IT asset data or performing unauthorized actions.

🟢

If Mitigated

With proper access controls and monitoring, impact limited to unauthorized access detection and containment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires knowledge of existing Oauth authorizations and targeted user accounts

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.18

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-vfxc-qg3v-j2r5

Restart Required: No

Instructions:

1. Backup GLPI installation and database. 2. Download GLPI 10.0.18 from official repository. 3. Replace existing files with new version. 4. Run database update if prompted.

🔧 Temporary Workarounds

Disable OauthIMAP Mail servers authentication

all

Disable any Mail servers authentication provider configured to use Oauth connection from OauthIMAP plugin

Navigate to GLPI Setup > Authentication > Mail servers and disable affected providers

🧯 If You Can't Patch

  • Disable OauthIMAP plugin entirely
  • Implement network segmentation to restrict GLPI access

🔍 How to Verify

Check if Vulnerable:

Check GLPI version and verify if OauthIMAP plugin is configured for Mail servers authentication

Check Version:

Check GLPI About page or database glpi_config table for version

Verify Fix Applied:

Confirm GLPI version is 10.0.18 or later, verify OauthIMAP authentication works correctly

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication patterns from unexpected IPs
  • Multiple failed login attempts followed by successful Oauth logins

Network Indicators:

  • Authentication requests to Oauth endpoints without corresponding user actions

SIEM Query:

source="glpi" (event_type="authentication" AND auth_method="oauth" AND result="success") | stats count by user, src_ip

🔗 References

📤 Share & Export