Impact
GLPI is an open‑source asset and IT management platform that offers ITIL Service Desk features and software licensing tracking. Between versions 11.0.0 and 11.0.4, an authenticated technician with user privileges can upload a specially crafted file and trigger its execution via unsafe PHP instantiation. This flaw allows attackers to run arbitrary code on the server, compromising confidentiality, integrity and availability, and is classified as CWE‑502 (Serialization Issues).
Affected Systems
The vulnerability exists in the glpi product from the glpi‑project (CPE: cpe:2.3:a:teclib-edition:glpi:*:*:*:*:*:*:*:*). Affected software versions range from 11.0.0 up to but excluding 11.0.5; versions 11.0.5 and later contain the fix.
Risk and Exploitability
The CVSS assessment assigns a score of 8.1, indicating high severity. The EPSS score is below 1 %, suggesting a low current exploitation likelihood, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires the attacker to have authenticated access as a technician, but once that is achieved, remote code execution can be performed. Administrators should treat this as a critical issue and ensure the software is updated promptly.
OpenCVE Enrichment