CVE-2025-27147
Published: 25 March 2025
Description
Adversaries may enumerate files and directories or may search in specific locations of a host or network share for certain information within a file system.
Security Summary
CVE-2025-27147 is an improper access control vulnerability (mapped to CWE-22, CWE-73, and CWE-552) in the GLPI Inventory Plugin for versions prior to 1.5.0. This plugin manages tasks for GLPI agents, such as network discovery and SNMP-based inventory, software deployment, VMware ESX host remote inventory, and data collection from files, the Windows registry, and WMI.
The vulnerability can be exploited over the network (AV:N) with low attack complexity (AC:L) by users possessing high privileges (PR:H), requiring no user interaction (UI:N). It results in high-scope impact (S:C), enabling attackers to achieve high confidentiality loss (C:H), such as unauthorized access to sensitive data, alongside low integrity (I:L) and availability (A:L) impacts. The CVSS v3.1 base score is 8.2.
Version 1.5.0 of the GLPI Inventory Plugin addresses the vulnerability. Additional mitigation guidance is available in the GitHub security advisory at GHSA-h6x9-jm98-cw7c and the fixing commit aaeb26d98d07019375c25b56e60fffc195553545.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
The improper access control vulnerability (with path traversal elements per CWE-22/73/552) in a network-accessible GLPI plugin enables exploitation of a public-facing application (T1190) and directly facilitates unauthorized collection of sensitive data from the local system (T1005) as well as file and directory discovery (T1083) through the plugin's data collection features.