{"api_version":"1","generated_at":"2026-04-22T19:37:37+00:00","cve":"CVE-2023-37278","urls":{"html":"https://cve.report/CVE-2023-37278","api":"https://cve.report/api/cve/CVE-2023-37278.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-37278","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-37278"},"summary":{"title":"CVE-2023-37278","description":"GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2023-07-13 23:15:00","updated_at":"2023-07-27 14:56:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4","name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4","refsource":"MISC","tags":[],"title":"SQL injection via dashboard administration · Advisory · glpi-project/glpi · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/glpi-project/glpi/releases/tag/10.0.9","name":"https://github.com/glpi-project/glpi/releases/tag/10.0.9","refsource":"MISC","tags":[],"title":"Release 10.0.9 · glpi-project/glpi · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-37278","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-37278","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"37278","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"glpi-project","cpe5":"glpi","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-37278","ASSIGNER":"security-advisories@github.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. An administrator can trigger SQL injection via dashboards administration. This vulnerability has been patched in version 10.0.9.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","cweId":"CWE-89"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"glpi-project","product":{"product_data":[{"product_name":"glpi","version":{"version_data":[{"version_affected":"=","version_value":">= 9.5.0, < 10.0.9"}]}}]}}]}},"references":{"reference_data":[{"url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4","refsource":"MISC","name":"https://github.com/glpi-project/glpi/security/advisories/GHSA-46gp-f96h-53w4"},{"url":"https://github.com/glpi-project/glpi/releases/tag/10.0.9","refsource":"MISC","name":"https://github.com/glpi-project/glpi/releases/tag/10.0.9"}]},"source":{"advisory":"GHSA-46gp-f96h-53w4","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.8,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-13 23:15:00","lastModifiedDate":"2023-07-27 14:56:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":2.3,"impactScore":6}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:glpi-project:glpi:*:*:*:*:*:*:*:*","versionEndExcluding":"10.0.9","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}