{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T14:52:23.160","vulnerabilities":[{"cve":{"id":"CVE-2022-39262","sourceIdentifier":"security-advisories@github.com","published":"2022-11-03T14:15:12.013","lastModified":"2024-11-21T07:17:54.413","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package, GLPI administrator can define rich-text content to be displayed on login page. The displayed content is can contains malicious code that can be used to steal credentials. This issue has been patched, please upgrade to version 10.0.4."},{"lang":"es","value":"GLPI significa Gestionnaire Libre de Parc Informatique. GLPI es un paquete gratuito de software de gestión de TI y activos. El administrador de GLPI puede definir el contenido de texto enriquecido que se mostrará en la página de inicio de sesión. El contenido mostrado puede contener código malicioso que puede usarse para robar credenciales. Este problema ha sido solucionado; actualice a la versión 10.0.4."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:L","baseScore":5.2,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":0.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":1.7,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-83"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionStartIncluding":"0.65","versionEndExcluding":"10.0.4","matchCriteriaId":"ECA464A3-4A24-4FD4-8126-074C36785A2A"}]}]}],"references":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-4x48-q2wr-cpg4","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/","source":"security-advisories@github.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-4x48-q2wr-cpg4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://huntr.dev/bounties/54fc907e-6983-4c24-b249-1440aac1643c/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}