Cyber Posture

CVE-2025-27147

High

Published: 25 March 2025

Published
25 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 8.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:L
EPSS Score 0.0011 28.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-27147 is a high-severity Path Traversal (CWE-22) vulnerability. Its CVSS base score is 8.2 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Enforces approved authorizations for access to system resources, directly addressing the improper access control allowing unauthorized data exposure in the GLPI Inventory Plugin.

prevent

Validates information inputs to prevent path traversal and external control of file paths exploited in this vulnerability (CWE-22, CWE-73).

prevent

Applies least privilege to limit high-privilege user access necessary for exploitation, reducing the impact of the improper access control.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1083 File and Directory Discovery Discovery
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Why these techniques?

The improper access control vulnerability (with path traversal elements per CWE-22/73/552) in a network-accessible GLPI plugin enables exploitation of a public-facing application (T1190) and directly facilitates unauthorized collection of sensitive data from the local system (T1005) as well as file and directory discovery (T1083) through the plugin's data collection features.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v19.0

NVD Description

The GLPI Inventory Plugin handles various types of tasks for GLPI agents, including network discovery and inventory (SNMP), software deployment, VMWare ESX host remote inventory, and data collection (files, Windows registry, WMI). Versions prior to 1.5.0 have an improper access…

more

control vulnerability. Version 1.5.0 fixes the vulnerability.

Deeper analysisAI

CVE-2025-27147 is an improper access control vulnerability (mapped to CWE-22, CWE-73, and CWE-552) in the GLPI Inventory Plugin for versions prior to 1.5.0. This plugin manages tasks for GLPI agents, such as network discovery and SNMP-based inventory, software deployment, VMware ESX host remote inventory, and data collection from files, the Windows registry, and WMI.

The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L) by users possessing high privileges (PR:H), requiring no user interaction (UI:N). It results in high-scope impact (S:C), enabling attackers to achieve high confidentiality loss (C:H), such as unauthorized access to sensitive data, alongside low integrity (I:L) and availability (A:L) impacts. The CVSS v3.1 base score is 8.2.

Version 1.5.0 of the GLPI Inventory Plugin addresses the vulnerability. Additional mitigation guidance is available in the GitHub security advisory at GHSA-h6x9-jm98-cw7c and the fixing commit aaeb26d98d07019375c25b56e60fffc195553545.

Details

CWE(s)

CVEs Like This One

CVE-2025-11371Shared CWE-552
CVE-2026-30914Shared CWE-22
CVE-2025-60946Shared CWE-22
CVE-2024-57549Shared CWE-22
CVE-2025-2264Shared CWE-22
CVE-2026-6024Shared CWE-22
CVE-2025-67160Shared CWE-22
CVE-2026-22557Shared CWE-22
CVE-2025-52452Shared CWE-22
CVE-2024-57669Shared CWE-22

References