CVE-2024-45611

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-45611
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-45611.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-45611
Aliases
  • GHSA-j73h-x6j3-m479
Downstream
Published
2024-11-15T20:16:18.459Z
Modified
2025-11-30T04:42:37.961959Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N CVSS Calculator
Summary
GLPI has a stored XSS at src/RSSFeed.php
Details

GLPI is an open-source asset and IT management software package that provides ITIL Service Desk features, licenses tracking and software auditing. An authenticated user can bypass the access control policy to create a private RSS feed attached to another user account and use a malicious payload to triggger a stored XSS. Upgrade to 10.0.17.

Database specific
{
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/45xxx/CVE-2024-45611.json",
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-79"
    ]
}
References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events