Description
Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and Google Latitude integration) are concatenated into UPDATE and INSERT statements without sanitization. An attacker able to compromise or impersonate the remote GPS tracker endpoint can inject SQL to manipulate the responder location, tracks, and assignment tables.
Published: 2026-05-21
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a classic SQL injection flaw in the incs/remotes.inc.php file of Open ISES Tickets, where latitude, longitude, callsign, mph, altitude, and timestamp values extracted from XML/JSON responses of external GPS tracking services are concatenated directly into UPDATE and INSERT statements without any sanitization. This flaw allows an attacker who can control or spoof the GPS tracker endpoint to embed malicious SQL, enabling unauthorized modification of responder location, track, and assignment data. The resulting impact concerns data integrity and potentially administrative privilege escalation within the application.

Affected Systems

Open ISES Tickets releases prior to version 3.44.2 are affected. The product vendor is Open ISES:Tickets. This includes all installations running any version older than 3.44.2, regardless of deployment model.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. The attack vector requires the attacker to compromise or impersonate the external GPS tracker service that feeds data into the application, a plausible scenario if the service is controlled by the same entity or can be spoofed over the network. Because the flaw is in server‑side code processing untrusted input, exploitation can be achieved via HTTP requests containing crafted GPS data, granting the attacker the ability to inject arbitrary SQL into the database and thereby tamper with critical operational data.

Generated by OpenCVE AI on May 21, 2026 at 18:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Open ISES Tickets 3.44.2 or later, which removes the vulnerable code and adds proper input validation.
  • If an upgrade cannot be performed immediately, disable or block the external GPS tracker integration to prevent malicious data from reaching the application.
  • Implement input validation or switch to parameterized queries for latitude, longitude, callsign, mph, altitude, and timestamp fields to eliminate concatenation‑based injection points.

Generated by OpenCVE AI on May 21, 2026 at 18:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in incs/remotes.inc.php where latitude, longitude, callsign, mph, altitude, and timestamp values parsed from external GPS tracking service XML/JSON responses (InstaMapper and Google Latitude integration) are concatenated into UPDATE and INSERT statements without sanitization. An attacker able to compromise or impersonate the remote GPS tracker endpoint can inject SQL to manipulate the responder location, tracks, and assignment tables.
Title Open ISES Tickets < 3.44.2 SQL Injection in incs/remotes.inc.php via External GPS Tracker Data
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T18:02:46.489Z

Reserved: 2026-05-21T13:15:18.101Z

Link: CVE-2026-48235

cve-icon Vulnrichment

Updated: 2026-05-21T18:02:42.453Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:20.310

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48235

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:30:16Z

Weaknesses