Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in circle.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the frm_id POST parameter directly into an HTML form input value attribute. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open ISES Tickets versions before 3.44.2 contain a reflected cross‑site scripting flaw in the circle.php script. The vulnerability arises because the frm_id POST parameter is inserted into an HTML form input value attribute without sanitization. An attacker can send a crafted request containing a malicious JavaScript payload that is reflected in the response and executed within the victim’s browser context. The result is that the attacker can inject and run arbitrary client‑side code, potentially stealing session cookies, altering page content, or performing actions on behalf of the authenticated user.

Affected Systems

The affected product is Open ISES Tickets for all versions older than 3.44.2. The vulnerability applies to any deployment of the Tickets application where the circle.php endpoint is reachable to authenticated users. No specific operating system or platform constraints are listed, implying that all users of these versions are potentially at risk.

Risk and Exploitability

The CVSS score of 5.1 indicates a medium severity reflecting that the vulnerability requires authenticated access and a symptom chosen by the attacker. The EPSS score is not available, so the immediate exploitation probability cannot be quantified. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to be authenticated against the application; the flaw is not exploitable by unauthenticated users. Even with authentication, execution is limited to the victim’s browser, thereby not compromising the server directly. Nevertheless, the ability to inject arbitrary JavaScript can lead to session hijacking, phishing, or data exfiltration within the affected user’s session.

Generated by OpenCVE AI on May 21, 2026 at 18:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch to release 3.44.2 or later to fix the unsanitized input handling in circle.php
  • If the patch cannot be applied immediately, restrict or disable the circle.php functionality for authenticated users until the fix is deployed, or remove the frm_id parameter from public forms
  • Implement a web application firewall rule or input validation layer that blocks script tags or other executable payloads in the frm_id value

Generated by OpenCVE AI on May 21, 2026 at 18:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in circle.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the frm_id POST parameter directly into an HTML form input value attribute. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Title Open ISES Tickets < 3.44.2 Reflected XSS via circle.php frm_id Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T17:56:06.035Z

Reserved: 2026-05-21T13:15:18.100Z

Link: CVE-2026-48215

cve-icon Vulnrichment

Updated: 2026-05-21T17:56:00.481Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:17.730

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48215

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:30:16Z

Weaknesses