CVE-2022-35914

CRITICAL KEV NUCLEI

GLPI htmLawed php command injection

Title source: metasploit

Description

/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.

Exploits (11)

exploitdb WORKING POC
by Miguel Redondo · bashwebappsphp
https://www.exploit-db.com/exploits/52023
nomisec WORKING POC 49 stars
by cosad3s · remote
https://github.com/cosad3s/CVE-2022-35914-poc
nomisec WORKING POC 3 stars
by senderend · remote
https://github.com/senderend/CVE-2022-35914
nomisec WORKING POC 2 stars
by noxlumens · remote
https://github.com/noxlumens/CVE-2022-35914_poc
nomisec WORKING POC 2 stars
by 0xGabe · remote
https://github.com/0xGabe/CVE-2022-35914
nomisec WORKING POC 2 stars
by Lzer0Kx01 · remote
https://github.com/Lzer0Kx01/CVE-2022-35914
nomisec WORKING POC 1 stars
by 6E6L6F · remote
https://github.com/6E6L6F/CVE-2022-35914
nomisec NO CODE
by btar1gan · poc
https://github.com/btar1gan/exploit_CVE-2022-35914
nomisec WORKING POC
by Johnermac · remote
https://github.com/Johnermac/CVE-2022-35914
vulncheck_xdb WORKING POC
remote
https://github.com/Orange-Cyberdefense/glpwnme
metasploit WORKING POC EXCELLENT
by cosad3s, bwatters-r7 · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/glpi_htmlawed_php_injection.rb

Nuclei Templates (1)

GLPI <=10.0.2 - Remote Command Execution
CRITICALVERIFIEDby For3stCo1d,allendemoura
Shodan: http.favicon.hash:"-1474875778" || http.title:"glpi"
FOFA: icon_hash="-1474875778" || title="glpi"

Scores

CVSS v3 9.8
EPSS 0.9439
EPSS Percentile 100.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2023-03-07
VulnCheck KEV 2022-10-05
InTheWild.io 2022-10-03
ENISA EUVD EUVD-2022-38785
CWE
CWE-74
Status published
Products (1)
glpi-project/glpi < 10.0.2
Published Sep 19, 2022
KEV Added Mar 07, 2023
Tracked Since Feb 18, 2026