CVE-2023-53943

GLPI 9.5.7 contains a username enumeration vulnerability in the lost password recovery mechanism that allows attackers to validate email addresses. Attackers can systematically test email addresses by submitting requests to the password reset endpoint and analyzing response differences to identify valid user accounts.
Configurations

Configuration 1 (hide)

cpe:2.3:a:glpi-project:glpi:9.5.7:*:*:*:*:*:*:*

History

31 Dec 2025, 17:34

Type Values Removed Values Added
CPE cpe:2.3:a:glpi-project:glpi:9.5.7:*:*:*:*:*:*:*
First Time Glpi-project
Glpi-project glpi
References () https://glpi-project.org/pt-br/ - () https://glpi-project.org/pt-br/ - Product
References () https://www.exploit-db.com/exploits/51418 - () https://www.exploit-db.com/exploits/51418 - Exploit, Third Party Advisory
References () https://www.vulncheck.com/advisories/glpi-username-enumeration-vulnerability-via-lost-password-endpoint - () https://www.vulncheck.com/advisories/glpi-username-enumeration-vulnerability-via-lost-password-endpoint - Third Party Advisory

18 Dec 2025, 22:15

Type Values Removed Values Added
References () https://www.exploit-db.com/exploits/51418 - () https://www.exploit-db.com/exploits/51418 -

18 Dec 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-18 20:15

Updated : 2025-12-31 17:34


NVD link : CVE-2023-53943

Mitre link : CVE-2023-53943

CVE.ORG link : CVE-2023-53943


JSON object : View

Products Affected

glpi-project

  • glpi
CWE
CWE-203

Observable Discrepancy