Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

586+ Articles
117+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-26026: GLPI Template Injection Enables Authenticated RCE via Admin Panel
CVE-2026-26026: GLPI Template Injection Enables Authenticated RCE via Admin Panel

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-26026

CVE-2026-26026: GLPI Template Injection Enables Authenticated RCE via Admin Panel

GLPI versions 11.0.0 through 11.0.5 contain a server-side template injection vulnerability in the administrator interface that allows authenticated admins to achieve remote code execution. CVSS 9.1. Fixed in GLPI 11.0.6.

Dylan H.

Security Team

April 7, 2026
7 min read

Affected Products

  • GLPI 11.0.0
  • GLPI 11.0.1
  • GLPI 11.0.2
  • GLPI 11.0.3
  • GLPI 11.0.4
  • GLPI 11.0.5

Executive Summary

CVE-2026-26026 is a critical server-side template injection (SSTI) vulnerability in GLPI, the widely deployed open-source IT asset and service management platform. The flaw affects versions 11.0.0 through 11.0.5 and allows an authenticated administrator to inject malicious template directives that the server executes, resulting in remote code execution (RCE) under the web server's process identity.

The vulnerability carries a CVSS score of 9.1 and has been patched in GLPI 11.0.6, released April 6, 2026.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-26026
CVSS Score9.1 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh (Administrator)
User InteractionNone
Affected SoftwareGLPI 11.0.0 – 11.0.5
Vulnerability TypeServer-Side Template Injection (SSTI)
ImpactRemote Code Execution
Patch AvailableYes — GLPI 11.0.6
PublishedApril 6, 2026

Affected Products

ProductAffected VersionsFixed Version
GLPI (Free IT Asset Management)11.0.0 – 11.0.511.0.6

GLPI is used by thousands of organizations globally for IT help desk, asset inventory, and CMDB functionality. It is especially prevalent in European enterprises, government agencies, and educational institutions.


Technical Analysis

Root Cause: Server-Side Template Injection

The vulnerability originates in GLPI's administrator-facing template rendering system. GLPI uses a templating engine (Twig) to render dynamic content within the admin panel. In the affected versions, certain admin-configurable fields do not properly sanitize or sandbox template expressions before passing them to the renderer.

A malicious administrator — or an attacker who has gained admin credentials — can inject Twig template syntax into these fields. When the template is rendered by the server, the injected expressions execute arbitrary PHP code in the context of the web server process.

Attack Flow

1. Attacker obtains GLPI administrator credentials
   (credential stuffing, phishing, brute-force, or insider)
2. Attacker navigates to a template-rendering admin feature
   (e.g. notification templates, custom field rendering, reports)
3. Attacker injects Twig SSTI payload into a configurable field:
   {{ system('id') }}
   or
   {{ ['id']|map('system')|join }}
4. GLPI's Twig renderer evaluates the expression server-side
5. Output is reflected in the rendered page or stored for later rendering
6. Attacker achieves RCE as the web server user (e.g. www-data)

Why CVSS 9.1 Despite Requiring Admin Access

While administrator privileges are required (lowering the score from the maximum 10.0), the impact metrics are all maximal:

MetricValueReason
ConfidentialityHighFull read access to GLPI database, config, and server filesystem
IntegrityHighAttacker can modify any data GLPI has access to
AvailabilityHighServer can be taken offline, data destroyed
ScopeChangedGLPI typically runs with access to the underlying OS and connected systems

In enterprise deployments, GLPI admin accounts are frequently shared among IT staff, making credential compromise a realistic attack path. Additionally, GLPI instances exposed to the internet with default or weak admin credentials are a known target of opportunistic scanning.

SSTI in Twig: Proof-of-Concept Patterns

Twig SSTI in PHP environments follows well-documented patterns. Common escalation payloads leverage Twig's filter system to invoke PHP functions:

{# Read /etc/passwd #}
{{ "/etc/passwd"|file_get_contents }}
 
{# Execute system command via PHP filter chain #}
{{ ['cat /etc/passwd']|map('shell_exec')|join }}
 
{# Using _self to access environment #}
{{ _self.env.registerUndefinedFilterCallback("exec") }}
{{ _self.env.getFilter("id") }}

These patterns are variants of publicly known Twig SSTI techniques. CVE-2026-26026 exposes an injection point not previously sanitized in the GLPI admin interface.


Impact Assessment

Impact AreaDescription
Remote Code ExecutionAttacker executes arbitrary OS commands as the web server user
Database CompromiseGLPI has direct access to its database; attacker can dump all asset, ticket, and user data
Credential HarvestingGLPI stores user passwords and API keys; full database access enables bulk extraction
ITSM Data ExfiltrationCMDB, hardware inventory, network diagrams, and service configurations exfiltrated
Lateral MovementCompromised web server can be used as a pivot point into internal networks
PersistenceAttacker can plant web shells or modify GLPI templates for persistent access
Supply Chain RiskGLPI integrations with Active Directory, LDAP, and ticketing systems create downstream exposure

Remediation

Step 1: Upgrade to GLPI 11.0.6

The fix is available in the official GLPI 11.0.6 release. Upgrade immediately.

# Backup your GLPI data and database before upgrading
mysqldump -u glpi_user -p glpi_db > glpi_backup_$(date +%F).sql
cp -r /var/www/glpi /var/www/glpi_backup_$(date +%F)
 
# Download GLPI 11.0.6
wget https://github.com/glpi-project/glpi/releases/download/11.0.6/glpi-11.0.6.tgz
 
# Extract and replace (adjust paths for your deployment)
tar xzf glpi-11.0.6.tgz
rsync -av --exclude='config/' --exclude='files/' glpi/ /var/www/glpi/
 
# Run the GLPI update script
php /var/www/glpi/bin/console db:update
 
# Verify version
php /var/www/glpi/bin/console glpi:version

Step 2: Audit Admin Account Usage

Before upgrading, audit who has GLPI administrator access. Revoke any accounts not in active use.

-- List all GLPI administrator accounts
SELECT id, name, realname, email, last_login
FROM glpi_users
WHERE is_active = 1
  AND id IN (
    SELECT users_id FROM glpi_profiles_users
    WHERE profiles_id IN (
      SELECT id FROM glpi_profiles WHERE interface = 'central' AND is_default = 0
    )
  )
ORDER BY last_login DESC;

Step 3: Restrict Admin Panel Access

If you cannot immediately upgrade:

  • Place GLPI behind a VPN or restrict /glpi/ to known management IPs at the web server level
  • Require MFA for all GLPI administrator logins
  • Disable internet exposure of the GLPI admin panel
# nginx: restrict GLPI to management subnet
location /glpi/ {
    allow 10.0.0.0/8;
    allow 172.16.0.0/12;
    deny all;
}

Step 4: Check for Compromise Indicators

# Review GLPI error and access logs for SSTI payload patterns
grep -E "\{\{|\{%|_self\.env|file_get_contents|shell_exec|system\(" \
  /var/log/nginx/glpi_access.log 2>/dev/null || \
grep -E "\{\{|\{%|_self\.env|file_get_contents|shell_exec|system\(" \
  /var/log/apache2/glpi_access.log 2>/dev/null
 
# Check for unexpected web shells in GLPI directory
find /var/www/glpi -name "*.php" -newer /var/www/glpi/version -mtime -30
 
# Review GLPI admin audit log for suspicious template modifications
# (check glpi_logs table in the database)

Detection Indicators

IndicatorDescription
Template syntax in HTTP request parameters{{, {%, _self.env in POST bodies
Unusual OS-level process spawning from web server userwww-data spawning shells or curl
Unexpected outbound connections from GLPI hostReverse shell or C2 callback
New PHP files in GLPI directoriesPlanted web shell for persistence
Database queries selecting credential fieldsCredential harvesting activity
Admin account logins from new IP addressesStolen credential usage

Post-Remediation Checklist

  1. Upgrade all GLPI instances to 11.0.6 or later
  2. Rotate all GLPI administrator passwords immediately
  3. Revoke API tokens used by GLPI integrations and reissue
  4. Audit GLPI admin accounts — remove unused or stale accounts
  5. Enable MFA on all accounts with administrative access
  6. Review GLPI notification templates and custom fields for injected payloads
  7. Scan the GLPI web root for web shells or unexpected PHP files
  8. Check OS-level audit logs (auditd) for commands executed as the web server user
  9. Restrict GLPI admin access to internal/VPN IPs only
  10. Monitor GLPI for unusual activity for at least 30 days post-remediation

References

  • NVD — CVE-2026-26026
  • GLPI Project — GitHub Security Advisories
  • GLPI 11.0.6 Release
#CVE-2026-26026#GLPI#Template Injection#RCE#CVSS 9.1#ITSM#Asset Management#NVD

Related Articles

CVE-2025-15379: MLflow Command Injection in Model Serving (CVSS 10.0)

A maximum-severity command injection vulnerability in MLflow's model serving container initialization allows attackers to execute arbitrary OS commands...

7 min read

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read

Tenda A15 UploadCfg Stack Buffer Overflow (CVE-2026-4567)

A CVSS 9.8 Critical stack-based buffer overflow in Tenda A15 firmware 15.13.07.13 allows unauthenticated remote attackers to execute arbitrary code by...

5 min read
Back to all Security Alerts