Impact
The vulnerability lies in the SQL Box component of the OTRS administration interface and results in uncontrolled resource consumption. When an attacker submits queries that trigger excessive CPU or memory usage, the process may be terminated, causing a denial of service for the webserver. This vulnerability does not allow direct data exfiltration or integrity compromise; its primary impact is on availability, as indicated by the CWE list.
Affected Systems
The affected product is OTRS by OTRS AG. Versions 7.0.x, 8.0.x, 2023.x, 2024.x, 2025.x, and all 2026.x releases prior to 2026.3.x are vulnerable.
Risk and Exploitability
The CVSS score of 4.5 indicates moderate severity; no EPSS data is available and the vulnerability is not listed in CISA KEV. The likely attack vector involves the web-based administration interface, where a user with sufficient privileges can trigger resource-heavy queries. Successful exploitation disrupts availability but does not directly compromise confidentiality or integrity.
OpenCVE Enrichment