Cyber Posture

CVE-2026-22248

High

Published: 11 March 2026

Published
11 March 2026
Modified
20 March 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0023 45.2th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through…

more

an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Timely flaw remediation through patching GLPI to version 11.0.5 directly eliminates the unsafe PHP instantiation vulnerability.

prevent

Information input validation prevents unsafe deserialization of untrusted data from uploaded malicious files.

preventdetect

Malicious code protection scans and blocks uploaded files containing deserializable exploits at system entry points.

Security SummaryAI

CVE-2026-22248 is a vulnerability in GLPI, an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking, and software auditing. Affecting versions from 11.0.0 up to but not including 11.0.5, the issue stems from an unsafe PHP instantiation that enables the execution of malicious files. It is classified under CWE-502 (Deserialization of Untrusted Data) and carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).

An authenticated user with technician privileges can exploit this vulnerability remotely by uploading a malicious file and triggering its execution. The high privileges required (PR:H) and high attack complexity (AC:H) limit feasibility to insiders or compromised accounts, but successful exploitation grants high impacts across confidentiality, integrity, and availability, with a changed scope (S:C) potentially allowing broader system compromise.

The vulnerability has been addressed in GLPI version 11.0.5. For mitigation details and patch information, refer to the official security advisory at https://github.com/glpi-project/glpi/security/advisories/GHSA-c9q3-mcxq-9vr4.

Details

CWE(s)

Affected Products

teclib-edition
glpi
11.0.0 — 11.0.5

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The deserialization vulnerability (CWE-502) in the GLPI web application allows authenticated remote users to upload and execute malicious files, directly enabling exploitation of a public-facing application for remote code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References