Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in icons/buttons/landb.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the frm_name and frm_id POST parameters directly into rendered HTML content and inline JavaScript. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open ISES Tickets versions prior to 3.44.2 contain a reflected cross‑site scripting flaw located in icons/buttons/landb.php. The vulnerability arises when an attacker sends unsanitized values for the frm_name and frm_id POST parameters, causing the application to embed the supplied data directly into the response HTML and inline JavaScript. Because the flaw is client‑side, it lets an authenticated user inject malicious scripts that run in the context of the victim's web session, potentially enabling cookie theft, session hijacking, in‑page defacement, or other client‑side compromise. The weakness is a classic reflected XSS, identified as CWE‑79.

Affected Systems

The affected product is Open ISES Tickets. All releases before version 3.44.2 are vulnerable; no specific build numbers are listed, so any edition of the application that has not yet been upgraded to 3.44.2 or later is at risk.

Risk and Exploitability

The CVSS score is 5.1, indicating a medium severity vulnerability. No EPSS score is available, and the weakness is not listed in CISA's KEV catalog, suggesting it is not known to be actively exploited in the wild. Exploitation requires the attacker to be authenticated to the application and to issue a crafted POST request to icons/buttons/landb.php. The risk is concentrated in the victim’s browser, but the impact can be significant for users with privileged sessions. Prompt patching is advised given the availability of an official fix and the moderate score.

Generated by OpenCVE AI on May 21, 2026 at 18:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open ISES Tickets to v3.44.2 or later
  • Restrict or disable access to icons/buttons/landb.php for non‑trusted users
  • Implement input validation or sanitization for frm_name and frm_id parameters to reject script payloads

Generated by OpenCVE AI on May 21, 2026 at 18:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 23 May 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 22 May 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Openises
Openises tickets
Vendors & Products Openises
Openises tickets

Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in icons/buttons/landb.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the frm_name and frm_id POST parameters directly into rendered HTML content and inline JavaScript. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Title Open ISES Tickets < 3.44.2 Reflected XSS via icons/buttons/landb.php frm_name and frm_id Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Openises Tickets
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-23T02:19:05.169Z

Reserved: 2026-05-21T13:15:18.100Z

Link: CVE-2026-48218

cve-icon Vulnrichment

Updated: 2026-05-23T02:18:58.759Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:18.110

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48218

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-22T12:30:27Z

Weaknesses