Description
Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in ajax/mobile_main.php where the id GET parameter is concatenated into the WHERE clause of a SELECT statement used as a ticket-existence sanity check without sanitization. Authenticated attackers can craft requests that alter query semantics to read, modify, or destroy database contents.
Published: 2026-05-21
Score: 7.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The flaw is a rudimentary SQL injection located in the ajax/mobile_main.php script of Open ISES Tickets. The script concatenates the id GET parameter directly into a WHERE clause of a SELECT statement used to verify a ticket’s existence, with no sanitization or parameterization. If an attacker with valid authentication submits a crafted id value, the query can be altered to read, modify, or delete arbitrary database rows, compromising data confidentiality, integrity, and availability. This weakness is classified as CWE‑89, indicating improper handling of untrusted input in SQL statements.

Affected Systems

This vulnerability afflicts all installations of Open ISES Tickets running any version older than 3.44.2. The affected product is the Open ISES Tickets application, which is a web‑based ticket management system. No specific operating systems are listed, so the vulnerability applies to any environment hosting the application.

Risk and Exploitability

The CVSS score of 7.1 places the issue in the high‑severity range, and the EPSS score is unavailable, so the current exploitation probability cannot be quantified. The vulnerability requires authentication, indicating that the attacker must first gain legitimate access, either by compromising a user account or exploiting another entry point. Once authenticated, the attacker can manipulate the id parameter and perform arbitrary database operations. The absence of a KEV listing suggests no widespread, publicly available exploits are yet documented, but the inherent danger of database compromise makes the risk significant for any deployment that stores sensitive ticket data.

Generated by OpenCVE AI on May 21, 2026 at 18:38 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later to remove the vulnerable code.
  • Restrict the authentication credentials used for the ticket system and enforce least privilege so that attackers with compromised accounts have limited database access.
  • Validate the id GET parameter to ensure it contains only numeric values before using it in the query.
  • Use prepared statements or parameterized queries when interacting with the database to eliminate injection possibilities.

Generated by OpenCVE AI on May 21, 2026 at 18:38 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 19:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in ajax/mobile_main.php where the id GET parameter is concatenated into the WHERE clause of a SELECT statement used as a ticket-existence sanity check without sanitization. Authenticated attackers can craft requests that alter query semantics to read, modify, or destroy database contents.
Title Open ISES Tickets < 3.44.2 SQL Injection via ajax/mobile_main.php id Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T18:32:57.731Z

Reserved: 2026-05-21T13:15:18.101Z

Link: CVE-2026-48238

cve-icon Vulnrichment

Updated: 2026-05-21T18:32:43.495Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:20.697

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48238

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:45:17Z

Weaknesses