CVE-2025-53105

7.5 HIGH

📋 TL;DR

In GLPI versions 10.0.0 through 10.0.18, authenticated non-admin users can manipulate business rule execution order, potentially altering system behavior. This affects all GLPI installations within the vulnerable version range where users have standard authenticated access.

💻 Affected Systems

Products:
  • GLPI (Gestionnaire Libre de Parc Informatique)
Versions: 10.0.0 to 10.0.18
Operating Systems: All platforms running GLPI
Default Config Vulnerable: ⚠️ Yes
Notes: All GLPI installations with standard authentication enabled are vulnerable. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could reorder critical business rules to bypass security controls, manipulate data flows, or disrupt IT service management operations.

🟠

Likely Case

Privilege escalation or unauthorized modification of business logic affecting asset management, ticket routing, or approval workflows.

🟢

If Mitigated

Limited impact if proper access controls and rule validation are implemented alongside network segmentation.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated user access but no administrative privileges. Exploitation is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.0.19

Vendor Advisory: https://github.com/glpi-project/glpi/security/advisories/GHSA-334r-2682-95wc

Restart Required: No

Instructions:

1. Backup your GLPI database and files. 2. Download GLPI 10.0.19 from official repository. 3. Follow standard GLPI upgrade procedure. 4. Verify upgrade completion and test functionality.

🔧 Temporary Workarounds

Restrict User Access

all

Temporarily limit non-essential user accounts to reduce attack surface

Enhanced Monitoring

all

Implement strict monitoring of business rule modifications and user activities

🧯 If You Can't Patch

  • Implement strict access controls and review all user permissions
  • Deploy network segmentation to isolate GLPI instance from critical systems

🔍 How to Verify

Check if Vulnerable:

Check GLPI version in Administration > General > Information. If version is between 10.0.0 and 10.0.18 inclusive, system is vulnerable.

Check Version:

Check GLPI web interface or examine glpi/config/config_db.php for version information

Verify Fix Applied:

After upgrade, confirm version shows 10.0.19 or higher in Administration > General > Information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual business rule modification events
  • Multiple rule order changes from non-admin users
  • Unexpected workflow behavior

Network Indicators:

  • Unusual API calls to rule management endpoints from non-admin accounts

SIEM Query:

source="glpi" AND (event_type="rule_modification" OR event_type="business_rule_change") AND user_role!="admin"

🔗 References

📤 Share & Export