Cyber Posture

CVE-2026-26027

High

Published: 06 April 2026

Published
06 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0007 20.3th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-26027 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Glpi-Project Glpi. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 20.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the stored XSS vulnerability by requiring remediation through upgrading GLPI to version 11.0.6 where the flaw is patched.

prevent

Validates inputs to the inventory endpoint to block malicious XSS payloads from being stored by unauthenticated users.

prevent

Filters inventory data outputs to neutralize XSS scripts before rendering in user browsers, preventing execution even if payloads are stored.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.007 JavaScript Execution
Adversaries may abuse various implementations of JavaScript for execution.
Why these techniques?

Stored XSS in public-facing GLPI inventory endpoint directly enables T1190 (exploit of public-facing web app by unauthenticated attacker) and T1059.007 (adversary-controlled JavaScript execution in victim browser session).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

GLPI is a free asset and IT management software package. From 11.0.0 to before 11.0.6, an unauthenticated user can store an XSS payload through the inventory endpoint. This vulnerability is fixed in 11.0.6.

Deeper analysisAI

CVE-2026-26027 is a stored cross-site scripting (XSS) vulnerability in GLPI, a free asset and IT management software package. It affects versions from 11.0.0 up to but not including 11.0.6, allowing an unauthenticated user to store an XSS payload through the inventory endpoint. The issue is linked to CWE-79 (Improper Neutralization of Input During Web Page Generation), CWE-116 (Improper Encoding or Escaping of Output), and CWE-306 (Missing Authentication for Critical Function), with a CVSS v3.1 base score of 7.5 (AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H).

An unauthenticated attacker with network access can exploit this by submitting a malicious payload to the inventory endpoint, which is then stored for later retrieval. Exploitation requires high attack complexity and user interaction, such as a legitimate user viewing the affected inventory data in their browser. Successful execution can result in high impacts to confidentiality, integrity, and availability within the victim's session, potentially enabling actions like script execution, data exfiltration, or account compromise.

The vulnerability is addressed in GLPI version 11.0.6. Administrators should upgrade to this patched release to mitigate the issue. Additional details are available in the GitHub Security Advisory at https://github.com/glpi-project/glpi/security/advisories/GHSA-chch-wcm9-f9cp.

Details

CWE(s)

Affected Products

glpi-project
glpi
11.0.0 — 11.0.6

CVEs Like This One

CVE-2026-25932Same product: Glpi-Project Glpi
CVE-2026-26263Same product: Glpi-Project Glpi
CVE-2025-21619Same product: Glpi-Project Glpi
CVE-2025-66417Same product: Glpi-Project Glpi
CVE-2026-22247Same product: Glpi-Project Glpi
CVE-2025-23046Same product: Glpi-Project Glpi
CVE-2025-24801Same product: Glpi-Project Glpi
CVE-2026-22044Same product: Glpi-Project Glpi
CVE-2026-26026Same product: Glpi-Project Glpi
CVE-2026-29047Same product: Glpi-Project Glpi

References