{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T17:21:03.293","vulnerabilities":[{"cve":{"id":"CVE-2022-39372","sourceIdentifier":"security-advisories@github.com","published":"2022-11-03T16:15:10.210","lastModified":"2024-11-21T07:18:09.450","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GLPI stands for Gestionnaire Libre de Parc Informatique. GLPI is a Free Asset and IT Management Software package that provides ITIL Service Desk features, licenses tracking and software auditing. Authenticated users may store malicious code in their account information. This issue has been patched, please upgrade to version 10.0.4. There are currently no known workarounds."},{"lang":"es","value":"GLPI significa Gestionnaire Libre de Parc Informatique. GLPI es un paquete gratuito de software de gestión de TI y activos que proporciona funciones de ITIL Service Desk, seguimiento de licencias y auditoría de software. Los usuarios autenticados pueden almacenar código malicioso en la información de su cuenta. Este problema ha sido solucionado; actualice a la versión 10.0.4. Actualmente no se conocen workarounds."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.1,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-79"},{"lang":"en","value":"CWE-80"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionStartIncluding":"0.70","versionEndExcluding":"10.0.4","matchCriteriaId":"575E19F1-5D9C-4AA1-9CC5-FC359BB2353B"}]}]}],"references":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2","source":"security-advisories@github.com","tags":["Third Party Advisory"]},{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-5rj7-95qc-89h2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}