Cyber Posture

CVE-2025-24799

High

Published: 18 March 2025

Published
18 March 2025
Modified
31 July 2025
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.2884 96.6th percentile
Risk Priority 32 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-24799 is a high-severity SQL Injection (CWE-89) vulnerability in Glpi-Project Glpi. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 3.4% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation directly eliminates the SQL injection vulnerability by patching GLPI to version 10.0.18.

prevent

Information input validation on the inventory endpoint prevents unauthenticated SQL injection through proper sanitization and use of prepared statements.

detect

Monitoring for information disclosure detects unauthorized data extraction resulting from SQL injection exploitation on the inventory endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing GLPI inventory endpoint directly maps to T1190 for exploitation; arbitrary SQL execution enables database data extraction mapping to T1213.006.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18.

Deeper analysisAI

CVE-2025-24799 is a SQL injection vulnerability (CWE-89) affecting GLPI, a free asset and IT management software package. The flaw exists in the inventory endpoint, allowing unauthenticated users to inject malicious SQL queries. It has a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating high confidentiality impact with network accessibility, low attack complexity, and no privileges or user interaction required. The vulnerability was published on 2025-03-18 and is fixed in GLPI version 10.0.18.

An unauthenticated remote attacker can exploit this vulnerability by sending crafted requests to the inventory endpoint, enabling arbitrary SQL query execution. Successful exploitation allows the attacker to extract sensitive data from the underlying database, such as asset details, user information, or other IT management records, without impacting integrity or availability.

The official GLPI security advisory (GHSA-jv89-g7f7-jwfg) on GitHub confirms the issue and states that it is resolved in version 10.0.18. Security practitioners should update to this patched release immediately and review access to inventory endpoints, applying input validation and prepared statements as interim defenses where patching is delayed.

Details

CWE(s)

Affected Products

glpi-project
glpi
10.0.0 — 10.0.18

CVEs Like This One

CVE-2026-22044Same product: Glpi-Project Glpi
CVE-2026-29047Same product: Glpi-Project Glpi
CVE-2026-26263Same product: Glpi-Project Glpi
CVE-2025-21619Same product: Glpi-Project Glpi
CVE-2025-66417Same product: Glpi-Project Glpi
CVE-2026-22247Same product: Glpi-Project Glpi
CVE-2025-23046Same product: Glpi-Project Glpi
CVE-2025-24801Same product: Glpi-Project Glpi
CVE-2026-26027Same product: Glpi-Project Glpi
CVE-2026-26026Same product: Glpi-Project Glpi

References