CVE-2026-22248
Published: 11 March 2026
Description
GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. From 11.0.0 to before 11.0.5, an authenticated technician user can upload a malicious file and trigger its execution through…
more
an unsafe PHP instantiation. This vulnerability is fixed in 11.0.5.
Mitigating Controls (NIST 800-53 r5)AI
Timely flaw remediation through patching GLPI to version 11.0.5 directly eliminates the unsafe PHP instantiation vulnerability.
Information input validation prevents unsafe deserialization of untrusted data from uploaded malicious files.
Malicious code protection scans and blocks uploaded files containing deserializable exploits at system entry points.
Security SummaryAI
CVE-2026-22248 is a vulnerability in GLPI, an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking, and software auditing. Affecting versions from 11.0.0 up to but not including 11.0.5, the issue stems from an unsafe PHP instantiation that enables the execution of malicious files. It is classified under CWE-502 (Deserialization of Untrusted Data) and carries a CVSS v3.1 base score of 8.0 (AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H).
An authenticated user with technician privileges can exploit this vulnerability remotely by uploading a malicious file and triggering its execution. The high privileges required (PR:H) and high attack complexity (AC:H) limit feasibility to insiders or compromised accounts, but successful exploitation grants high impacts across confidentiality, integrity, and availability, with a changed scope (S:C) potentially allowing broader system compromise.
The vulnerability has been addressed in GLPI version 11.0.5. For mitigation details and patch information, refer to the official security advisory at https://github.com/glpi-project/glpi/security/advisories/GHSA-c9q3-mcxq-9vr4.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The deserialization vulnerability (CWE-502) in the GLPI web application allows authenticated remote users to upload and execute malicious files, directly enabling exploitation of a public-facing application for remote code execution.