GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Mar 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Glpi-project
Glpi-project glpi |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:* | |
Vendors & Products |
Glpi-project
Glpi-project glpi |
Tue, 25 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 25 Feb 2025 16:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 25 Feb 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers. | |
Title | GLPI vulnerable to exposure of sensitive information in the `status.php` endpoint | |
Weaknesses | CWE-200 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-02-25T15:48:58.424Z
Reserved: 2024-12-29T03:00:24.715Z
Link: CVE-2025-21626

Updated: 2025-02-25T15:48:53.356Z

Status : Analyzed
Published: 2025-02-25T16:15:37.663
Modified: 2025-03-04T13:49:18.880
Link: CVE-2025-21626

No data.