Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in patient_JF.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id GET parameter directly into a JavaScript variable assignment. Attackers can craft a malicious URL containing a JavaScript payload in the ticket_id parameter that executes in the victim's browser when the URL is visited.
Published: 2026-05-20
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the patient_JF.php file of Open ISES Tickets and allows an attacker to embed arbitrary JavaScript into a web page by supplying an unsanitized value through the ticket_id GET parameter. Because the value is assigned to a JavaScript variable without validation, a malicious payload can be executed in the victim’s browser when the crafted URL is visited. This is a classic Reflected Cross‑Site Scripting flaw (CWE‑79) that can lead to session hijacking, defacement, or other client‑side compromise for authenticated users.

Affected Systems

Open ISES Tickets versions older than 3.44.2 are affected. The affected product is the Open ISES Tickets web application, released by openises, with the vulnerability present in all builds prior to the 3.44.2 update. No other versions or sub‑products are currently listed as impacted.

Risk and Exploitability

The CVSS score of 5.1 reflects a moderate risk that requires the attacker to be an authenticated user, indicating that unauthorized users cannot trigger the flaw. The EPSS score is unavailable, and the vulnerability is not listed in CISA’s KEV catalog. Attackers would need to obtain valid credentials to an instance of the application and then craft a URL containing a JavaScript payload in the ticket_id parameter; when the victim visits the URL, the payload would execute in their browser, potentially compromising the session. Because the exploit needs authentication and the risk relies on client‑side execution, the overall threat level is moderate but still warrants timely remediation.

Generated by OpenCVE AI on May 20, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later to eliminate the unsanitized handling of the ticket_id parameter.
  • If an upgrade is not immediately possible, implement server‑side validation or sanitization of the ticket_id GET parameter to remove or encode any JavaScript payloads before they are embedded into the page.
  • Perform a comprehensive review of other input fields in patient_JF.php and related scripts to ensure all user‑supplied data is properly filtered or escaped, thereby preventing similar XSS susceptibilities.

Generated by OpenCVE AI on May 20, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in patient_JF.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id GET parameter directly into a JavaScript variable assignment. Attackers can craft a malicious URL containing a JavaScript payload in the ticket_id parameter that executes in the victim's browser when the URL is visited.
Title Open ISES Tickets < 3.44.2 Reflected XSS via patient_JF.php ticket_id Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-20T19:36:44.500Z

Reserved: 2026-03-31T20:40:15.617Z

Link: CVE-2026-35010

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-20T20:16:38.207

Modified: 2026-05-20T20:16:38.207

Link: CVE-2026-35010

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-20T21:30:36Z

Weaknesses