Overview
This report examines CVE-2025-54780, a vulnerability identified in the glpi-screenshot-plugin versions below 2.0.2. This plugin, used extensively for taking screenshots or screen recordings directly from GLPI, is found to be susceptible to an exploit that could potentially leak system files or abuse PHP wrappers. The significance of this vulnerability is high, given the potential for system compromise and data leakage.
Vulnerability Summary
CVE ID: CVE-2025-54780
Severity: High – CVSS 7.7
Attack Vector: Network
Privileges Required: Low (Authenticated User)
User Interaction: Required
Impact: Potential system compromise or data leakage due to the ability to leak system files or use PHP wrappers by authenticated users.
Affected Products
Escape the Surveillance Era
Most apps won’t tell you the truth.
They’re part of the problem.
Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.
Ameeba Chat gives you a way out.
- • No phone number
- • No email
- • No personal info
- • Anonymous aliases
- • End-to-end encrypted
Chat without a trace.
Product | Affected Versions
glpi-screenshot-plugin | versions below 2.0.2
How the Exploit Works
The exploit takes advantage of the /ajax/screenshot.php endpoint present in the glpi-screenshot-plugin. An authenticated user can craft a malicious request to this endpoint, causing the system to leak files or execute PHP wrappers, potentially compromising the system or leading to data leakage.
Conceptual Example Code
Here’s a conceptual example of how the vulnerability might be exploited:
POST /ajax/screenshot.php HTTP/1.1
Host: target.example.com
Content-Type: application/json
Authorization: Bearer <valid-auth-token>
{ "file_path": "../../../../etc/passwd" }
In the example above, an authenticated user sends a POST request to the vulnerable endpoint, attempting to retrieve sensitive information from the system. By manipulating the file_path parameter, the user could direct the system to leak files outside of the intended directory.
Mitigation Guidance
The primary solution to this vulnerability is to update the glpi-screenshot-plugin to version 2.0.2 or above, where the vulnerability has been fixed. In the absence of an immediate patch application, a Web Application Firewall (WAF) or Intrusion Detection System (IDS) can be utilized as temporary mitigation, blocking or alerting on suspicious activity to the /ajax/screenshot.php endpoint.

