Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in add_nm.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id POST parameter directly into an HTML form input value attribute and an inline JavaScript string literal. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A reflected cross‑site scripting vulnerability exists in the add_nm.php script of Open ISES Tickets. The flaw allows an attacker who is authenticated to pass an unsanitized value through the ticket_id POST parameter, which is then reflected directly into both an HTML form input value attribute and an inline JavaScript string. When the attacker’s crafted request is rendered by the victim’s browser, the embedded JavaScript executes in the victim’s context. This can lead to theft of session cookies, execution of arbitrary code in the user’s browser, or other malicious actions confined to the victim’s session.

Affected Systems

Open ISES Tickets versions before 3.44.2. The affected component is the add_nm.php endpoint that processes ticket creation or modification requests. All deployments of Open ISES Tickets older than 3.44.2 are potentially exposed if users can authenticate and submit ticket_id values.

Risk and Exploitability

The vulnerability has a CVSS score of 5.1, indicating moderate severity. No EPSS score is available and the flaw is not listed in the CISA KEV catalog. Exploitation requires that the attacker first authenticates to the system, after which they can send a malicious POST request containing a crafted ticket_id. While the attack surface is limited to authenticated users, the impact on a compromised account can be significant for that user’s session. The overall risk is moderate to high for environments where privileged users are exposed to potential XSS payloads.

Generated by OpenCVE AI on May 21, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Open ISES Tickets to version 3.44.2 or later, which contains input sanitization for the ticket_id field.
  • Enforce strict input validation on all ticket-related endpoints to reject characters that could form JavaScript execution contexts.
  • Deploy a content security policy that restricts inline script execution, and consider a web application firewall rule set that blocks suspicious POST payloads to ticket endpoints.

Generated by OpenCVE AI on May 21, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in add_nm.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id POST parameter directly into an HTML form input value attribute and an inline JavaScript string literal. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Title Open ISES Tickets < 3.44.2 Reflected XSS via add_nm.php ticket_id Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T18:35:48.996Z

Reserved: 2026-05-21T13:15:18.100Z

Link: CVE-2026-48214

cve-icon Vulnrichment

Updated: 2026-05-21T18:35:35.282Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:17.603

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48214

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:30:16Z

Weaknesses