Description
Open ISES Tickets before 3.44.2 embeds a hardcoded Google Maps API key in tables.php that is committed to the public source repository. The key can be extracted by anyone with read access to the source and used to make Google Maps Platform requests billed against the original owner's Google Cloud project.
Published: 2026-05-21
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Open ISES Tickets before version 3.44.2 contains a hardcoded Google Maps API key within the tables.php file. The key is stored directly in the source code and committed to the public repository, meaning that anyone who can read the source can extract the key. If used, the key authorizes requests to Google Maps Platform under the project owner’s billing account, potentially leading to unexpected charges or denial of service when limits are exceeded. This is an example of a credential or secret leakage vulnerability, identified as CWE‑798.

Affected Systems

The vulnerability affects installations of Open ISES:Tickets older than version 3.44.2. No specific minor releases are listed, so all releases preceding the 3.44.2 stable milestone are considered at risk.

Risk and Exploitability

The CVSS score of 6.9 indicates a moderate to high risk profile. Because the API key is embedded in code rather than delivered over the network, the attack vector is rebased on code review or source download, which is usually considered a local or developer‑level exposure. The EPSS score is not available, and the vulnerability is not currently listed in the CISA KEV catalog, suggesting no known widespread exploitation. Nonetheless, any actor who obtains the repository can freely use the key to make Google Maps requests billed to the owner's account, which has a predictable financial impact and could be technically trivial to perform. Consequently, the vulnerability is likely to be abused in a targeted scenario or by automated scripts that scan the repository for hardcoded credentials.

Generated by OpenCVE AI on May 21, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Open ISES Tickets version 3.44.2 or later, where the hardcoded Google Maps API key has been removed.
  • Scan the codebase for any remaining hardcoded API keys or secrets and move them to secure configuration mechanisms such as environment variables or vaults.
  • Regenerate the compromised Google Maps API key in the Google Cloud console and update the application configuration to use the new key, if any use of the old key was detected.
  • Restrict source‑code repository access and audit read permissions to prevent unauthorized extraction of secrets.

Generated by OpenCVE AI on May 21, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 17:45:00 +0000

Type Values Removed Values Added
Description Open ISES Tickets before 3.44.2 embeds a hardcoded Google Maps API key in tables.php that is committed to the public source repository. The key can be extracted by anyone with read access to the source and used to make Google Maps Platform requests billed against the original owner's Google Cloud project.
Title Open ISES Tickets < 3.44.2 Hardcoded Google Maps API Key in tables.php
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-05-21T17:47:25.346Z

Reserved: 2026-05-21T13:15:18.102Z

Link: CVE-2026-48245

cve-icon Vulnrichment

Updated: 2026-05-21T17:47:20.580Z

cve-icon NVD

Status : Deferred

Published: 2026-05-21T18:16:21.653

Modified: 2026-05-21T19:10:12.323

Link: CVE-2026-48245

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T18:45:17Z

Weaknesses