CVE-2026-25936
Published: 17 March 2026
Summary
CVE-2026-25936 is a medium-severity SQL Injection (CWE-89) vulnerability in Teclib-Edition Glpi. Its CVSS base score is 6.5 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 13.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of known vulnerabilities, directly addressing this SQL injection flaw fixed in GLPI version 11.0.6.
Mandates validation and sanitization of user inputs to block SQL injection attempts by authenticated users.
Vulnerability scanning identifies SQL injection flaws like CVE-2026-25936 in GLPI versions 11.0.0 through 11.0.5.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in a network-accessible web application (GLPI) directly enables T1190 for initial unauthorized data access and T1213.006 for querying/exfiltrating sensitive information from the backend database.
NVD Description
GLPI is a free Asset and IT management software package. Starting in version 11.0.0 and prior to version 11.0.6, an authenticated user can perfom a SQL injection. Version 11.0.6 fixes the issue.
Deeper analysisAI
CVE-2026-25936 is a SQL injection vulnerability (CWE-89) affecting GLPI, a free open-source Asset and IT management software package. The flaw impacts versions starting from 11.0.0 up to but not including 11.0.6, where an authenticated user can perform SQL injection attacks. It carries a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N) and was published on 2026-03-17.
An attacker with low privileges, such as any authenticated user, can exploit this vulnerability remotely over the network with low attack complexity and no user interaction required. Exploitation enables the attacker to achieve high confidentiality impact by extracting sensitive data from the underlying database, without affecting integrity or availability.
The official GLPI security advisory confirms that version 11.0.6 resolves the issue. Additional details are available at https://github.com/glpi-project/glpi/security/advisories/GHSA-qw3x-7vv2-7759.
Details
- CWE(s)