CVE-2025-27147
Published: 25 March 2025
Summary
CVE-2025-27147 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Enforces approved authorizations for access to system resources, directly addressing the improper access control allowing unauthorized data exposure in the GLPI Inventory Plugin.
Validates information inputs to prevent path traversal and external control of file paths exploited in this vulnerability (CWE-22, CWE-73).
Applies least privilege to limit high-privilege user access necessary for exploitation, reducing the impact of the improper access control.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The improper access control vulnerability (with path traversal elements per CWE-22/73/552) in a network-accessible GLPI plugin enables exploitation of a public-facing application (T1190) and directly facilitates unauthorized collection of sensitive data from the local system (T1005) as well as file and directory discovery (T1083) through the plugin's data collection features.
NVD Description
The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access…
more
control vulnerability. Version 1.5.0 fixes the vulnerability.
Deeper analysisAI
CVE-2025-27147 is an improper access control vulnerability (mapped to CWE-22, CWE-73, and CWE-552) in the GLPI Inventory Plugin for versions prior to 1.5.0. This plugin manages tasks for GLPI agents, such as network discovery and SNMP-based inventory, software deployment, VMware ESX host remote inventory, and data collection from files, the Windows registry, and WMI.
The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L) by users possessing high privileges (PR:H), requiring no user interaction (UI:N). It results in high-scope impact (S:C), enabling attackers to achieve high confidentiality loss (C:H), such as unauthorized access to sensitive data, alongside low integrity (I:L) and availability (A:L) impacts. The CVSS v3.1 base score is 8.2.
Version 1.5.0 of the GLPI Inventory Plugin addresses the vulnerability. Additional mitigation guidance is available in the GitHub security advisory at GHSA-h6x9-jm98-cw7c and the fixing commit aaeb26d98d07019375c25b56e60fffc195553545.
Details
- CWE(s)