{"id":"CVE-2023-28639","summary":"GLPI vulnerable to reflected Cross-site Scripting in search pages","details":"GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.","aliases":["GHSA-r93q-chh5-jgh4"],"modified":"2026-04-10T04:56:58.129154Z","published":"2023-04-05T00:00:00Z","database_specific":{"cwe_ids":["CWE-79"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28639.json"},"references":[{"type":"WEB","url":"https://github.com/glpi-project/glpi/releases/tag/10.0.7"},{"type":"WEB","url":"https://github.com/glpi-project/glpi/releases/tag/9.5.13"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28639.json"},{"type":"ADVISORY","url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28639"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"b094bc0c617761d6e7eee900950f24cea658d560"},{"fixed":"b094bc0c617761d6e7eee900950f24cea658d560"}],"database_specific":{"versions":[{"introduced":"0.85"},{"fixed":"0.85*"}]}},{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"0"},{"last_affected":"d110d2b6976208ca2cac0747cab92781b45475a7"},{"last_affected":"bce21331d50a020cd0928178a68fe4aac2cc50b4"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"9.5.13"},{"last_affected":"10.0.7"}]}},{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"815997021a5df4feb7077a12f6f52769e9bd3459"},{"fixed":"815997021a5df4feb7077a12f6f52769e9bd3459"}],"database_specific":{"versions":[{"introduced":"10.0.0"},{"fixed":"10.0.0*"}]}}],"versions":["0.90","0.90-RC1","0.90-RC2","0.90-beta1","0.90-beta2","10.0.0","10.0.0-beta","10.0.0-rc1","10.0.0-rc2","10.0.0-rc3","10.0.1","10.0.2","10.0.3","10.0.4","10.0.5","10.0.6","10.0.7","9.1","9.1-RC1","9.1-RC2","9.3-beta","9.4.0","9.4.0-beta","9.4.0-rc1","9.4.0-rc2","9.4.1","9.4.1.1","9.5.0","9.5.0-rc1","9.5.0-rc2","9.5.1","9.5.10","9.5.11","9.5.12","9.5.13","9.5.2","9.5.3","9.5.4","9.5.5","9.5.6","9.5.7","9.5.8","9.5.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-28639.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}