Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in ticketsmdb_import.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the multiple POST parameters (mdbhost, mdbdb, mdbuser, mdbpassword, mdbprefix, ticketshost, ticketsdb, ticketsuser, ticketspassword, ticketsprefix) directly into HTML form hidden input value attributes. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability resides in the ticketsmdb_import.php component of Open ISES Tickets versions earlier than 3.44.2. It allows an authenticated attacker to supply values for a range of POST parameters—such as mdbhost, mdbdb, mdbuser, mdbpassword, mdbprefix, ticketshost, ticketsdb, ticketsuser, ticketspassword, and ticketsprefix—which are then inserted directly into the value attributes of hidden input elements in the resulting HTML. Because these values are not sanitized, an attacker can embed arbitrary JavaScript that will execute when the response is rendered in a victim’s browser, enabling the attacker to execute code in the victim's session or capture sensitive information, thereby compromising the confidentiality and integrity of the user’s data and potentially their session. The weakness is classified as a reflected cross‑site scripting flaw (CWE‑79).

Affected Systems

Open ISES:Tickets deployments running any version prior to 3.44.2 are impacted. No explicit sub‑versions are listed, so all releases below the highlighted 3.44.2 patch remain vulnerable.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity. The EPSS metric is not available, and the vulnerability is not listed in the CISA KEV catalog. Attackers must be authenticated to access ticketsmdb_import.php, implying that compromised user credentials or insider access are prerequisite. Once authenticated, an attacker can simply craft a malicious POST request with a JavaScript payload that, when processed, will be reflected into hidden form fields and executed in the context of any user who subsequently views the imported ticket data. Given the moderate CVSS score and absence of publicly documented exploits, the risk is present but not exceptionally high; however, the impact of successful exploitation can be significant to users within the affected system.

Generated by OpenCVE AI on May 21, 2026 at 18:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official patch by upgrading Open ISES Tickets to version 3.44.2 or later.
  • Reduce the attack surface by restricting access to ticketsmdb_import.php to the minimum set of trusted administrators and ensuring that other users lack authentication to this endpoint.
  • Implement input validation or sanitization for hidden form values in ticketsmdb_import.php, and consider disabling the import feature until a patch is available if administrative changes are impractical.

Generated by OpenCVE AI on May 21, 2026 at 18:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in ticketsmdb_import.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the multiple POST parameters (mdbhost, mdbdb, mdbuser, mdbpassword, mdbprefix, ticketshost, ticketsdb, ticketsuser, ticketspassword, ticketsprefix) directly into HTML form hidden input value attributes. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
Title Open ISES Tickets < 3.44.2 Reflected XSS via ticketsmdb_import.php Multiple POST Parameters
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T17:10:17.026Z

Reserved: 2026-05-21T13:15:18.100Z

Link: CVE-2026-48230

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:19.640

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48230

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:30:16Z

Weaknesses