{"id":"CVE-2025-23046","summary":"GLPI vulnerable to unauthorized authentication by email using the OAuthIMAP plugin","details":"GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to version 10.0.18, if a \"Mail servers\" authentication provider is configured to use an Oauth connection provided by the OauthIMAP plugin, anyone can connect to GLPI using a user name on which an Oauth authorization has already been established. Version 10.0.18 contains a patch. As a workaround, one may disable any \"Mail servers\" authentication provider configured to use an Oauth connection provided by the OauthIMAP plugin.","aliases":["GHSA-vfxc-qg3v-j2r5"],"modified":"2026-04-10T05:22:48.829730Z","published":"2025-02-25T17:48:17.801Z","database_specific":{"cwe_ids":["CWE-303"],"cna_assigner":"GitHub_M","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23046.json"},"references":[{"type":"WEB","url":"https://github.com/glpi-project/glpi/releases/tag/10.0.18"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/23xxx/CVE-2025-23046.json"},{"type":"ADVISORY","url":"https://github.com/glpi-project/glpi/security/advisories/GHSA-vfxc-qg3v-j2r5"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-23046"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/glpi-project/glpi","events":[{"introduced":"9fa6de558a9987561b80afd57a796a3fa19deee6"},{"fixed":"9389461d8a207bdcdf4f50f9db9fc8acdf6c7bbf"}]}],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-23046.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N"}]}