<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Glpi — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/glpi/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 06 Apr 2026 15:17:07 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/glpi/feed.xml" rel="self" type="application/rss+xml"/><item><title>GLPI Unauthenticated Time-Based Blind SQL Injection Vulnerability (CVE-2026-26263)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-sql-injection/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-sql-injection/</guid><description>GLPI versions 11.0.0 to before 11.0.6 are susceptible to an unauthenticated time-based blind SQL injection vulnerability in the search engine, allowing remote attackers to potentially extract sensitive information.</description><content:encoded><![CDATA[<p>GLPI, a widely used free asset and IT management software, is vulnerable to a critical security flaw. Specifically, versions 11.0.0 to before 11.0.6 contain an unauthenticated time-based blind SQL injection vulnerability (CVE-2026-26263) within its search engine functionality. This vulnerability allows remote attackers to inject malicious SQL code without needing prior authentication. Exploitation could lead to unauthorized data access, modification, or deletion, potentially compromising the entire GLPI instance and the sensitive information it manages. The vulnerability was reported on April 6th, 2026 and patched in version 11.0.6. Organizations using affected versions of GLPI should upgrade immediately to mitigate this risk.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a GLPI instance running a vulnerable version (11.0.0 to 11.0.5).</li>
<li>The attacker crafts a malicious HTTP request targeting the search engine functionality.</li>
<li>The crafted request includes a time-based blind SQL injection payload within a search query parameter.</li>
<li>The GLPI server processes the malicious SQL query without proper sanitization.</li>
<li>The injected SQL code interacts with the database, causing time delays based on conditional logic.</li>
<li>The attacker analyzes the response times to infer the results of the injected SQL queries.</li>
<li>Through repeated requests, the attacker extracts sensitive data from the database, such as usernames, passwords, or configuration details.</li>
<li>The attacker uses the extracted credentials to gain unauthorized access to the GLPI system or other related resources.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26263 can lead to complete compromise of the GLPI instance. Attackers can access sensitive IT asset data, user credentials, and system configurations. This can result in data breaches, financial loss, and reputational damage. Given GLPI&rsquo;s widespread use in IT management, a successful attack could impact numerous organizations across various sectors. If exploited, attackers can use the compromised GLPI instance as a pivot point to further compromise the internal network.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GLPI to version 11.0.6 or later to patch CVE-2026-26263.</li>
<li>Deploy the provided Sigma rule to detect potential exploitation attempts targeting the GLPI search functionality.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads, focusing on parameters used by the GLPI search engine.</li>
<li>Implement input validation and sanitization measures to prevent SQL injection vulnerabilities in web applications.</li>
<li>Regularly review and update web application firewalls (WAFs) with the latest rules to block known SQL injection patterns.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>glpi</category><category>cve-2026-26263</category><category>web-application</category></item><item><title>GLPI Template Injection RCE (CVE-2026-26026)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-rce/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-rce/</guid><description>GLPI versions 11.0.0 to before 11.0.6 are vulnerable to remote code execution (RCE) via template injection by an authenticated administrator, allowing for arbitrary code execution on the server.</description><content:encoded><![CDATA[<p>GLPI is a widely used open-source IT asset management software. A critical vulnerability, CVE-2026-26026, affects versions 11.0.0 to 11.0.5. This vulnerability stems from a template injection flaw that can be exploited by a logged-in administrator. Successful exploitation allows the administrator to achieve remote code execution (RCE) on the underlying server. The vulnerability was reported on April 6, 2026, and has been patched in version 11.0.6. Organizations using vulnerable versions of GLPI should upgrade immediately to prevent potential compromise. The high CVSS score (9.1) reflects the severity and potential impact of this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains administrative access to a vulnerable GLPI instance (versions 11.0.0 - 11.0.5).</li>
<li>The attacker navigates to a section of the GLPI interface that allows for template modification.</li>
<li>The attacker crafts a malicious template containing code injection payloads.</li>
<li>The attacker saves the modified template within the GLPI system.</li>
<li>The GLPI system processes the malicious template, executing the injected code.</li>
<li>The injected code allows the attacker to execute arbitrary commands on the server.</li>
<li>The attacker establishes a reverse shell to gain persistent access.</li>
<li>The attacker pivots to other systems or exfiltrates sensitive data.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-26026 can lead to complete compromise of the GLPI server. This allows an attacker to gain unauthorized access to sensitive IT asset information, customer data, and potentially other systems on the network. The impact is significant, as it allows for data breaches, service disruption, and further lateral movement within the organization&rsquo;s infrastructure. Given GLPI&rsquo;s function in managing IT assets, this can result in widespread damage across the organization.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately upgrade GLPI to version 11.0.6 or later to patch CVE-2026-26026.</li>
<li>Review and audit GLPI administrator accounts for any suspicious activity or unauthorized access attempts.</li>
<li>Deploy the Sigma rule &ldquo;Detect GLPI Template Injection Attempts&rdquo; to detect exploitation attempts in web server logs.</li>
<li>Monitor web server logs for unusual POST requests to template management endpoints containing suspicious code constructs.</li>
<li>Investigate any alerts generated by the &ldquo;Detect GLPI Template Injection RCE&rdquo; rule in your SIEM.</li>
<li>Restrict network access to the GLPI server to only authorized personnel and systems.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>cve-2026-26026</category><category>template-injection</category><category>rce</category><category>glpi</category></item><item><title>GLPI SQL Injection Vulnerability (CVE-2026-29047)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-sqli/</link><pubDate>Mon, 06 Apr 2026 15:17:07 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-sqli/</guid><description>GLPI versions 10.0.0 before 10.0.24 and 11.0.6 are vulnerable to SQL Injection (CVE-2026-29047) via the logs export feature, allowing authenticated users to potentially execute arbitrary SQL commands.</description><content:encoded><![CDATA[<p>GLPI is a free asset and IT management software package.  CVE-2026-29047 affects GLPI versions 10.0.0 up to, but not including, 10.0.24, as well as version 11.0.6. An authenticated user can exploit a SQL injection vulnerability present in the logs export feature. Successful exploitation could allow an attacker to read sensitive data, modify database content, or even execute arbitrary commands on the underlying database server.  Organizations using vulnerable versions of GLPI should upgrade to versions 10.0.24 or 11.0.6 as soon as possible to mitigate the risk. This vulnerability highlights the importance of keeping software up to date with the latest security patches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains valid user credentials to a GLPI instance (versions 10.0.0 to 10.0.23 or 11.0.0 to 11.0.5).</li>
<li>The attacker authenticates to the GLPI web interface using the acquired credentials.</li>
<li>The attacker navigates to the &ldquo;logs export&rdquo; feature within the GLPI interface.</li>
<li>The attacker crafts a malicious SQL query and injects it into a parameter that is used when exporting the logs. This parameter is not properly sanitized.</li>
<li>The GLPI application processes the crafted SQL query without proper sanitization, leading to SQL injection.</li>
<li>The injected SQL query is executed against the GLPI database.</li>
<li>The attacker retrieves sensitive data from the database or modifies existing data.</li>
<li>The attacker escalates the attack, potentially gaining control of the underlying database server depending on database privileges.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29047 can lead to unauthorized access to sensitive information stored in the GLPI database, such as user credentials, asset information, and IT configuration details. An attacker could modify or delete critical data, disrupt IT operations, and potentially gain control over the entire GLPI system. This could impact all organizations utilizing the vulnerable GLPI version, potentially leading to data breaches and financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GLPI to version 10.0.24 or 11.0.6 to patch CVE-2026-29047 (references: advisory in Overview).</li>
<li>Implement database activity monitoring to detect and alert on suspicious SQL queries (references: Attack Chain step 6).</li>
<li>Review user access controls and enforce the principle of least privilege to limit the impact of compromised accounts (references: Attack Chain step 1).</li>
<li>Deploy the Sigma rule provided to detect potential exploitation attempts targeting the logs export feature (references: rules section).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>glpi</category><category>sqli</category><category>cve-2026-29047</category></item><item><title>GLPI Cross-Site Scripting Vulnerability (CVE-2026-25932)</title><link>https://feed.craftedsignal.io/briefs/2026-04-glpi-xss/</link><pubDate>Mon, 06 Apr 2026 15:17:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-glpi-xss/</guid><description>CVE-2026-25932 is a cross-site scripting vulnerability in GLPI versions 0.60 to before 10.0.24, where an authenticated technician user can store a malicious XSS payload within supplier fields, potentially leading to arbitrary code execution in the context of other users' browsers.</description><content:encoded><![CDATA[<p>CVE-2026-25932 is a stored cross-site scripting (XSS) vulnerability affecting GLPI, a free asset and IT management software package. The vulnerability exists in versions 0.60 up to, but not including, 10.0.24. An authenticated technician user, with the necessary privileges, can inject a malicious XSS payload into the supplier fields within the GLPI application. This payload is then stored in the database and executed when other users with access to the affected supplier data view the information. This can lead to session hijacking, defacement of the GLPI interface, or other malicious actions performed in the context of the victim user. Successful exploitation requires a valid technician account and user interaction. The vulnerability is patched in GLPI version 10.0.24.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker authenticates to GLPI as a technician user with sufficient privileges.</li>
<li>Attacker navigates to the supplier management section of the GLPI interface.</li>
<li>Attacker identifies a supplier field vulnerable to XSS (e.g., name, address, contact).</li>
<li>Attacker injects a malicious JavaScript payload into the chosen supplier field.</li>
<li>The malicious payload is stored in the GLPI database.</li>
<li>A different user (e.g., administrator or another technician) accesses the supplier record containing the XSS payload through the GLPI web interface.</li>
<li>The GLPI application retrieves the supplier data from the database and renders it in the user&rsquo;s browser.</li>
<li>The malicious JavaScript code is executed within the context of the victim user&rsquo;s browser, enabling the attacker to perform actions such as stealing cookies, redirecting the user, or modifying data within GLPI.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-25932 can allow an attacker to execute arbitrary JavaScript code within the context of other GLPI users&rsquo; browsers. This can result in session hijacking, where the attacker gains unauthorized access to the victim&rsquo;s GLPI account. The attacker may also be able to deface the GLPI interface or modify data within the application. The CVSS v3.1 score of 7.2 indicates a high potential impact. While the precise number of vulnerable installations is unknown, any organization using GLPI versions 0.60 to 10.0.23 is potentially affected.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade GLPI to version 10.0.24 or later to patch CVE-2026-25932.</li>
<li>Deploy the Sigma rule &ldquo;Detect GLPI Suspicious HTTP Referer&rdquo; to identify potential exploitation attempts targeting GLPI.</li>
<li>Implement strict input validation and output encoding measures to prevent XSS vulnerabilities in GLPI.</li>
<li>Review GLPI user permissions and roles to minimize the impact of potential XSS attacks.</li>
<li>Monitor web server logs for suspicious activity related to GLPI, such as unusual requests or error messages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>xss</category><category>glpi</category><category>cve-2026-25932</category></item></channel></rss>