CVE-2023-41326

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-41326
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-41326.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-41326
Aliases
  • GHSA-5wj6-hp4c-j5q9
Downstream
Published
2023-09-26T22:40:49.778Z
Modified
2025-12-05T00:05:11.255956Z
Severity
  • 8.1 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N CVSS Calculator
Summary
Account takeover via Kanban feature in GLPI
Details

GLPI stands for Gestionnaire Libre de Parc Informatique is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. A logged user from any profile can hijack the Kanban feature to alter any user field, and end-up with stealing its account. Users are advised to upgrade to version 10.0.10. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-269"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/41xxx/CVE-2023-41326.json"
}
References

Affected packages

Git / github.com/glpi-project/glpi

Affected ranges

Type
GIT
Repo
https://github.com/glpi-project/glpi
Events

Affected versions

10.*

10.0.0
10.0.0-beta
10.0.0-rc1
10.0.0-rc2
10.0.0-rc3
10.0.1
10.0.2
10.0.3
10.0.4
10.0.5
10.0.6
10.0.7
10.0.8
10.0.9

9.*

9.5.0
9.5.1
9.5.2
9.5.3
9.5.4
9.5.5
9.5.6
9.5.7