GLPI 9.5.7 contains a username enumeration vulnerability in the lost password recovery mechanism that allows attackers to validate email addresses. Attackers can systematically test email addresses by submitting requests to the password reset endpoint and analyzing response differences to identify valid user accounts.
References
| Link | Resource |
|---|---|
| https://glpi-project.org/pt-br/ | Product |
| https://www.exploit-db.com/exploits/51418 | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/glpi-username-enumeration-vulnerability-via-lost-password-endpoint | Third Party Advisory |
| https://www.exploit-db.com/exploits/51418 | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-18 20:15
Updated : 2025-12-31 17:34
NVD link : CVE-2023-53943
Mitre link : CVE-2023-53943
CVE.ORG link : CVE-2023-53943
JSON object : View
Products Affected
glpi-project
- glpi
CWE
CWE-203
Observable Discrepancy
