CVE-2023-22722

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-22722
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-22722.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-22722
Aliases
  • GHSA-352j-wr38-493c
Downstream
Published
2023-01-25T05:58:01Z
Modified
2025-10-16T09:28:34.973280Z
Severity
  • 6.8 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N CVSS Calculator
Summary
glpi subject to Cross-site Scripting (XSS) - Reflected
Details

GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.

References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events

Affected versions

10.*

10.0.0
10.0.0-beta
10.0.0-rc1
10.0.0-rc2
10.0.0-rc3
10.0.1
10.0.2
10.0.3
10.0.4
10.0.5

9.*

9.4.0
9.4.1
9.4.1.1
9.4.2
9.4.3
9.4.4
9.4.5
9.4.6
9.5.0
9.5.0-rc1
9.5.0-rc2
9.5.1
9.5.2
9.5.3
9.5.4
9.5.5
9.5.6
9.5.7