Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in single.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id GET parameter directly into an HTML attribute. Attackers can craft a malicious URL containing a JavaScript payload in the id parameter that executes in the victim's browser when the URL is visited.
Published: 2026-05-20
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the single.php page of Open ISES Tickets and allows an authenticated attacker to insert JavaScript into the ticket_id GET parameter. Because the value is reflected into an HTML attribute without sanitization, any script passed in the id field will execute in the browser of any user who opens the malicious URL. This can lead to theft of session information, credential hijacking, or other actions that compromise the victim’s session within the application. The weakness is a classic reflected cross‑site scripting flaw (CWE‑79).

Affected Systems

The affected product is Open ISES Tickets 3.44.1 and earlier versions released before 3.44.2. All deployments of the openises:tickets application running these pre‑3.44.2 releases are vulnerable. No information is provided about sub‑versions, so any release labeled earlier than 3.44.2 should be considered at risk.

Risk and Exploitability

The CVSS score of 5.1 positions this issue in the moderate severity range. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, indicating that it is not a known actively exploited vulnerability at the time of this analysis. The likely attack vector is a user following a crafted link containing a malicious JavaScript payload in the ticket_id parameter. Since the flaw requires an authenticated session to be exploited effectively, attackers must first log in to the system or gain credentials, which limits the attack surface compared to an unauthenticated XSS. Nonetheless, authenticated users can remain at risk if they click a link or open content from a compromised site that directs them to the vulnerable URL.

Generated by OpenCVE AI on May 20, 2026 at 21:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Open ISES Tickets to version 3.44.2 or later, which removes the unsanitized handling of the ticket_id parameter.
  • If an upgrade is not immediately feasible, enforce strict Content‑Security‑Policy headers to restrict script execution from unknown origins, thereby reducing the impact of any reflected payload.
  • Implement additional input validation on the ticket_id parameter to ensure it contains only numeric identifiers before including it in any HTML attribute.

Generated by OpenCVE AI on May 20, 2026 at 21:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in single.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id GET parameter directly into an HTML attribute. Attackers can craft a malicious URL containing a JavaScript payload in the id parameter that executes in the victim's browser when the URL is visited.
Title Open ISES Tickets < 3.44.2 Reflected XSS via single.php ticket_id Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-20T19:34:40.055Z

Reserved: 2026-03-31T20:40:15.617Z

Link: CVE-2026-35008

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-20T20:16:37.910

Modified: 2026-05-20T20:16:37.910

Link: CVE-2026-35008

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T22:00:08Z

Weaknesses