Cyber Security News

GLPI ITSM Tool Flaw Allows Attackers to Inject Malicious SQL Queries

A critical SQL injection vulnerability, tracked as CVE-2025-24799, has been identified in GLPI, a widely used open-source IT Service Management (ITSM) tool.

The flaw, if exploited, enables remote, unauthenticated attackers to manipulate database queries, potentially leading to severe consequences such as data theft, tampering, or even remote code execution.

CVE-2025-24799 is an SQL injection vulnerability that specifically resides in the way GLPI processes certain user inputs.

By exploiting this flaw, attackers can send malicious SQL queries, effectively bypassing authentication and gaining unauthorized access to sensitive data stored in the GLPI database.

Beyond data exfiltration, attackers might gain control over the underlying server or execute arbitrary commands, as per a report by Broadcom.

The vulnerability affects GLPI versions before 10.0.18, and experts have emphasized the critical nature of this flaw due to the widespread use of the ITSM tool in IT support, asset management, and helpdesk environments.

Product NameVersionCVE
GLPI ITSM Tool10.0.0 – 10.0.17CVE-2025-24799

Impact of the Vulnerability

Security researchers have warned that the exploitation of this vulnerability could have extensive consequences:

  • Data Exposure: Attackers can retrieve sensitive information about IT assets, users, or business processes from the GLPI database.
  • Data Manipulation: Malicious actors could alter or corrupt data stored within the system, disrupting IT operations or business workflows.
  • Potential Remote Code Execution (RCE): A compromise could lead to full system takeover by injecting malicious code into the database, leveraging the access gained for further attacks.

Given that GLPI is commonly used in corporate and governmental IT environments, the vulnerability presents a significant risk for organizations relying on this tool.

Patch and Mitigation

The GLPI development team has promptly addressed the issue in the release of version 10.0.18, which includes a patch to eliminate the vulnerability.

Organizations using GLPI are urged to update their installations immediately to mitigate any potential risk.

For those unable to update promptly, implementing additional safeguards, such as enabling a web application firewall (WAF) and closely monitoring database logs, is recommended to detect and block suspicious activity.

CVE-2025-24799 was discovered by cybersecurity researchers from a leading security firm during a routine security audit of open-source applications.

The researchers promptly reported the flaw to GLPI developers, ensuring a coordinated disclosure to minimize potential exploitation.

Organizations using GLPI should urgently upgrade to version 10.0.18 or later to prevent potential exploitation.

Cybersecurity teams are advised to perform a comprehensive review of their GLPI implementation and adopt robust security practices, such as minimizing exposure to the internet and reinforcing database access controls.

As cyber threats continue to evolve, this incident underscores the importance of proactive vulnerability management and timely patching in safeguarding IT infrastructure.

Are you from SOC/DFIR Teams? – Analyse Malware, Phishing Incidents & get live Access with ANY.RUN -> Start Now for Free. 

Divya

Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Massive 400GB X (Twitter) Data Leak Surfaces on Hacker Forums

A colossal 400GB trove containing data from 2.873 billion X (formerly Twitter) users has surfaced…

2 hours ago

PortSwigger Launches Burp AI to Enhance Penetration Testing with AI

PortSwigger, the makers of Burp Suite, has taken a giant leap forward in the field…

3 hours ago

Chord Specialty Dental Partners Data Breach Exposes Customer Personal Data

Chord Specialty Dental Partners is under scrutiny after revealing a data breach that compromised the…

3 hours ago

Kentico Xperience CMS XSS Vulnerability Allows Remote Code Execution

Kentico Xperience CMS, a widely used platform designed for enterprises and organizations, is under scrutiny…

3 hours ago

LensDeal Data Breach Exposes 100,000 Customers’ Personal Information

A major data breach involving LensDeal, a Netherlands-based contact lens supplier, has reportedly exposed the…

4 hours ago

Apple Issues Warning on Three 0-Day Vulnerabilities Under Active Exploitation

Apple has issued an urgent security advisory concerning three critical zero-day vulnerabilities – CVE-2025-24200, CVE-2025-24201, and CVE-2025-24085 – which…

4 hours ago