Cyber Security News

GLPI Open-source ITSM Tool Vulnerability Let Attackers Inject Malicious SQL Queries

A critical vulnerability in GLPI, a widely-used open-source IT Service Management (ITSM) platform tracked as CVE-2025-24799, enables unauthenticated attackers to perform SQL injection attacks through the inventory endpoint.

This flaw can lead to remote code execution (RCE), potentially resulting in a complete system compromise of the affected IT Service Management platform.

The vulnerability affects GLPI version 10.0.17 and all prior versions dating back to 10.0.0. 

Organizations utilizing this popular asset management solution are strongly advised to update immediately to version 10.0.18, which contains the necessary security patches.

CVE-2025-24799 – SQL injection vulnerability in GLPI

The vulnerability stems from inadequate sanitization of SQL queries within GLPI’s agent functionality, specifically in the handleAgent function located in /src/Agent.php. 

This component, used for inventory purposes, processes HTTP requests without proper validation, allowing attackers to inject malicious SQL commands.

A typical attack sequence involves:

  • The attacker sends a crafted HTTP request to the inventory endpoint.
  • The unsanitized input is processed by the database engine.
  • Injected SQL commands execute with database user privileges.
  • Depending on system configuration, privilege escalation to RCE is possible.

This vulnerability is particularly dangerous because it requires no authentication, providing an open attack vector for malicious actors targeting internet-exposed GLPI instances. 

The attack could allow unauthorized access to sensitive data and, under certain conditions, enable attackers to write and execute arbitrary code on affected servers.

Given that successful exploitation would enable remote attackers to run arbitrary SQL statements on the compromised system, this vulnerability is categorized as having a “High” severity.

The vulnerability was discovered and reported by Lexfo security researchers. 

The summary of the vulnerability is given below:

Risk FactorsDetails
Affected ProductsGLPI versions 10.0.0 to 10.0.17
ImpactUnauthenticated SQL injection, Remote code execution (RCE)
Exploit Prerequisites– GLPI instance exposed to the internet- Native inventory feature enabled (typically default)
CVSS 3.1 Score7.5 (High)

Mitigation Recommendations

Security experts recommend immediate implementation of the following measures:

  • Update to GLPI version 10.0.18 as soon as possible.
  • Implement network security controls to restrict access to GLPI instances.
  • Monitor systems for potential exploitation attempts.
  • Conduct security audits of GLPI deployments.

Organizations using GLPI should prioritize this update to protect critical IT assets and sensitive information from this significant security threat.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Guru Baran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Sweet Security Brings Runtime-CNAPP Power to Windows

Tel Aviv, Israel, October 29th, 2025, CyberNewsWire Sweet Security Brings Runtime-CNAPP Power to Windows Sweet…

4 minutes ago

AWS US-EAST-1 Region Experiences Delays in EC2 Instance Deployments

Amazon Web Services encountered significant operational challenges in its US-EAST-1 region on October 28, 2025,…

11 minutes ago

WordPress Plugin Vulnerability Exposes 7 Million Sites to XSS Attack

A critical cross-site scripting (XSS) vulnerability has been discovered in the popular LiteSpeed Cache plugin…

31 minutes ago

Hikvision Exploiter – An Automated Exploitation Toolkit Targeting Hikvision IP Cameras

A new open-source tool called HikvisionExploiter has emerged, designed to automate attacks on vulnerable Hikvision…

42 minutes ago

10 Malicious npm Packages with Auto-Run Feature on Install Deploys Multi-Stage Credential Harvester

The npm ecosystem faces a sophisticated new threat as ten malicious packages have emerged, each…

2 hours ago

PoC Exploit Released for BIND 9 Vulnerability that Let Attackers Forge DNS Records

A public exploit code demonstrating how attackers could exploit CVE-2025-40778, a critical vulnerability in BIND…

3 hours ago