Description
GLPI is a free asset and IT management software package. In versions starting from 0.71 to before 10.0.23 and before 11.0.5, when remote authentication is used, based on SSO variables, a user can steal a GLPI session previously opened by another user on the same machine. This issue has been patched in versions .
Published: 2026-02-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Session Hijacking
Action: Update ASAP
AI Analysis

Impact

GLPI, a widely used asset and IT management platform, has a flaw that permits a user employing remote authentication through SSO variables to seize an existing session belonging to another user on the same machine. This session theft enables the attacker to access GLPI resources with the privileges of the hijacked user, leading to unauthorized data disclosure and potential manipulation of system settings. The weakness stems from improper handling of session identifiers during SSO authentication and is classified as session fixation (CWE-384).

Affected Systems

Vulnerable GLPI installations cover all releases from version 0.71 up to, but not including, 10.0.23, and from any 11.x release before 11.0.5. The issue was addressed in GLPI 10.0.23 and 11.0.5 and later, as indicated by the release notes and official advisories. Systems running older versions, especially those that rely on external SSO authentication, remain at risk until the patch is applied.

Risk and Exploitability

The CVSS score of 4.3 rates this vulnerability as moderate, and the EPSS score is below 1%, suggesting a presently low likelihood of exploitation. Because the flaw requires SSO authentication and access to the same machine, it is likely to be exploited by users with local or shared workstation access rather than by purely remote attackers. The vulnerability is not included in the CISA KEV catalog, indicating no known large‑scale active exploitation at this time, but patching should remain a priority to mitigate potential risk.

Generated by OpenCVE AI on April 17, 2026 at 23:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade GLPI to version 10.0.23 or later, or 11.0.5 or later, to apply the session‑fixation fix.
  • If an immediate upgrade is not feasible, disable or restrict SSO authentication for users who share machines or enforce that SSO credentials are not transmitted via shared environment variables.
  • After SSO changes, force a logout or regenerate session identifiers to prevent reuse.
  • Monitor GLPI logs for abnormal session reuse or unauthorized access attempts and respond promptly when suspicious activity is detected.

Generated by OpenCVE AI on April 17, 2026 at 23:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 06 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Glpi-project
Glpi-project glpi
Vendors & Products Glpi-project
Glpi-project glpi

Wed, 04 Feb 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description GLPI is a free asset and IT management software package. In versions starting from 0.71 to before 10.0.23 and before 11.0.5, when remote authentication is used, based on SSO variables, a user can steal a GLPI session previously opened by another user on the same machine. This issue has been patched in versions .
Title GLPI is vulnerable to session stealing on externally authenticated user change
Weaknesses CWE-384
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Glpi-project Glpi
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T19:56:27.764Z

Reserved: 2026-01-14T16:08:37.482Z

Link: CVE-2026-23624

cve-icon Vulnrichment

Updated: 2026-02-04T19:56:18.966Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T18:16:08.913

Modified: 2026-02-06T21:18:17.370

Link: CVE-2026-23624

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T23:30:15Z

Weaknesses