### [CVE-2025-24799](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-24799) ![](https://img.shields.io/static/v1?label=Product&message=glpi&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%2010.0.0%2C%20%3C%2010.0.18%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-89%3A%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20an%20SQL%20Command%20('SQL%20Injection')&color=brightgreen) ### Description GLPI is a free asset and IT management software package. An unauthenticated user can perform a SQL injection through the inventory endpoint. This vulnerability is fixed in 10.0.18. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xMarcio/cve - https://github.com/ARPSyndicate/cve-scores - https://github.com/GhostTroops/TOP - https://github.com/MatheuZSecurity/Exploit-CVE-2025-24799 - https://github.com/MuhammadWaseem29/CVE-2025-24799 - https://github.com/Orange-Cyberdefense/glpwnme - https://github.com/PuddinCat/GithubRepoSpider - https://github.com/Rosemary1337/CVE-2025-24799 - https://github.com/airbus-cert/CVE-2025-24799-scanner - https://github.com/galletitaconpate/CVE-2025-24799 - https://github.com/l0928h/kate - https://github.com/nak000/CVE-2025-24799-sqli - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/plzheheplztrying/cve_monitor - https://github.com/tanjiti/sec_profile