CVE vulnerability scanning in GLPI

The NexTool CVE Scan module automatically checks for known vulnerabilities in the installed GLPI version and runs 17 environment security checks, generating a visual Security Score.

Is your GLPI instance exposed to known vulnerabilities? – The NexTool CVE Scan module answers this question in seconds, cross-referencing the installed version with public CVE databases and auditing 17 critical environment points.

The problem

IT teams operating GLPI rarely have a formal process for tracking CVE vulnerabilities associated with the production version. The NVD (NIST) and GitHub Advisory Database continuously publish CVEs, but manual tracking is impractical in the daily routine of a service desk.

Beyond the software version, the PHP environment and server configurations introduce silent risks: display_errors enabled in production, session cookie without HttpOnly flag, absence of headers like Content-Security-Policy – each detail is a potential attack surface.

Without consolidated visibility, these problems only appear after an incident. CVE Scan was created precisely to anticipate this scenario.

How CVE Scan works

When executing the scan, the module automatically detects the GLPI version via the GLPI_VERSION constant and cross-references it with a dynamic CVE database composed of three sources:

  • GitHub Advisory Database – advisory links and details of reported flaws.
  • NVD / NIST – authoritative source for CVSS scoring and official metadata.
  • 22 static fallback CVEs – ensure coverage even without access to external APIs.

The merge is done by CVE ID: NVD prevails for CVSS, GitHub provides advisory links. A local cache is updated daily via cron and on demand with each manual execution.

Alongside the CVE Scan, the module runs 17 security checks of the environment, grouped into four categories:

  • PHP Configuration (8 checks)display_errors, expose_php, allow_url_include, session.cookie_httponly, session.cookie_secure, and others.
  • GLPI Checks (3 checks) – presence of the install/ directory, active debug mode, and config_db.php permissions.
  • HTTP Headers (3 checks)X-Frame-Options, Content-Security-Policy, and Strict-Transport-Security.
  • Other checks (3 checks) – PHP version at EOL, server software, and additional environment check.

The result is consolidated in a Security Score from 0 to 100 with color coding: red (0–40 – critical), yellow (41–70 – moderate), and green (71–100 – healthy). Each item includes a status indicator (vulnerable or fixed_in_newer), the version that fixes it, and remediation instructions.

List of CVE scan records in GLPI with vulnerability results found
Scan records: scan history with detected vulnerabilities per asset

How to activate

  1. Install the NexTool plugin on GLPI.
  2. Go to Setup > NexTool > Modules.
  3. Find the CVE Scan card and click Install, then Activate.
  4. Access the module and click Run Scan in the Features tab.
  5. Optionally, enter a GitHub token and an NVD API Key in the Settings tab to increase request limits.
CVE Scan module configuration page in GLPI with vulnerability scanning
Module configuration panel in GLPI

Who is it for

The module is ideal for GLPI administrators who need a quick and recurring security audit, IT teams that go through internal or external audits and need evidence of the environment's state, and managers who want to track security posture evolution over time via scan history.

Compatibility

  • GLPI: 10.x and 11.x
  • Plan: FREE
  • Plugin: NexTool 3.x+

Next step

CVE Scan is part of NexTool, a modular plugin for GLPI. Explore all modules or contact the team for a complete security consultation.


This content was produced with the assistance of artificial intelligence and reviewed by the Nextool Solutions team. Screenshots are from the real GLPI environment with the NexTool plugin.

Need help?