The following table lists the changes that have been made to the
CVE-2025-21626 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.
-
New CVE Received
by [email protected]Feb. 25, 2025
Action Type Old Value New Value Added Description GLPI is a free asset and IT management software package. Starting in version 0.71 and prior to version 10.0.18, an anonymous user can fetch sensitive information from the `status.php` endpoint. Version 10.0.18 contains a fix for the issue. Some workarounds are available. One may delete the `status.php` file, restrict its access, or remove any sensitive values from the `name` field of the active LDAP directories, mail servers authentication providers and mail receivers. Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N Added CWE CWE-200 Added Reference https://github.com/glpi-project/glpi/releases/tag/10.0.18 Added Reference https://github.com/glpi-project/glpi/security/advisories/GHSA-5vvr-pxwf-3w77