CVE-2026-22248
Published: 11 March 2026
Summary
CVE-2026-22248 is a high-severity Deserialization of Untrusted Data (CWE-502) vulnerability in Teclib-Edition Glpi. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 49.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching GLPI to version 11.0.5 directly eliminates the unsafe PHP instantiation vulnerability.
Information input validation prevents unsafe deserialization of untrusted data from uploaded malicious files.
Malicious code protection scans and blocks uploaded files containing deserializable exploits at system entry points.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The deserialization vulnerability (CWE-502) in the GLPI web application allows authenticated remote users to upload and execute malicious files, directly enabling exploitation of a public-facing application for remote code execution.
NVD Description
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through…
more
an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.
Deeper analysisAI
CVE-2026-22248 is a vulnerability in GLPI, an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking, and software auditing. Affecting versions from 11.0.0 up to but not including 11.0.5, the issue stems from an unsafe PHP instantiation that enables the execution of malicious files. It is classified under CWE-502 (Deserialization of Untrusted Data) and carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
An authenticated user with technician privileges can exploit this vulnerability remotely by uploading a malicious file and triggering its execution. The high privileges required (PR:H) and high attack complexity (AC:H) limit feasibility to insiders or compromised accounts, but successful exploitation grants high impacts across confidentiality, integrity, and availability, with a changed scope (S:C) potentially allowing broader system compromise.
The vulnerability has been addressed in GLPI version 11.0.5. For mitigation details and patch information, refer to the official security advisory at https://github.com/glpi-project/glpi/security/advisories/GHSA-c9q3-mcxq-9vr4.
Details
- CWE(s)