Cyber Posture

CVE-2026-22248

HighRCE

Published: 11 March 2026

Published
11 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0026 49.7th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22248 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Teclib-Edition Glpi. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching GLPI to version 11.0.5 directly eliminates the unsafe PHP instantiation vulnerability.

prevent

Information input validation prevents unsafe deserialization of untrusted data from uploaded malicious files.

preventdetect

Malicious code protection scans and blocks uploaded files containing deserializable exploits at system entry points.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The deserialization vulnerability (CWE-502) in the GLPI web application allows authenticated remote users to upload and execute malicious files, directly enabling exploitation of a public-facing application for remote code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through…

more

an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.

Deeper analysisAI

CVE-2026-22248 is a vulnerability in GLPI, an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking, and software auditing. Affecting versions from 11.0.0 up to but not including 11.0.5, the issue stems from an unsafe PHP instantiation that enables the execution of malicious files. It is classified under CWE-502 (Deserialization of Untrusted Data) and carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

An authenticated user with technician privileges can exploit this vulnerability remotely by uploading a malicious file and triggering its execution. The high privileges required (PR:H) and high attack complexity (AC:H) limit feasibility to insiders or compromised accounts, but successful exploitation grants high impacts across confidentiality, integrity, and availability, with a changed scope (S:C) potentially allowing broader system compromise.

The vulnerability has been addressed in GLPI version 11.0.5. For mitigation details and patch information, refer to the official security advisory at https://github.com/glpi-project/glpi/security/advisories/GHSA-c9q3-mcxq-9vr4.

Details

CWE(s)

Affected Products

teclib-edition
glpi
11.0.0 — 11.0.5

CVEs Like This One

CVE-2026-25936Same product: Teclib-Edition Glpi
CVE-2026-23489Same vendor: Teclib-Edition
CVE-2025-54366Shared CWE-502
CVE-2025-7916Shared CWE-502
CVE-2025-0994Shared CWE-502
CVE-2024-56180Shared CWE-502
CVE-2025-9121Shared CWE-502
CVE-2026-24378Shared CWE-502
CVE-2025-27300Shared CWE-502
CVE-2025-55182Shared CWE-502

References