Description
Request Tracker is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the "Page" parameter in GET requests. An attacker can craft a URL that, when opened, results in arbitrary JavaScript execution in the victim’s browser.

This vulnerability affects versions from 5.0.4 up to 5.0.9 and from 6.0.0 up to 6.0.2.
Published: 2026-05-21
Score: 5.1 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Request Tracker exposes a reflected cross‑site scripting (XSS) flaw through the GET parameter "Page". When a victim opens a crafted URL, the application reflects that parameter without proper sanitization, allowing arbitrary JavaScript to run in the victim’s browser. This can lead to credential theft, session hijacking, or site defacement. The weakness is a classic cross‑site scripting vulnerability (CWE‑79) that directly impacts the confidentiality and integrity of the victim’s session.

Affected Systems

The vulnerable product is Best Practical’s Request Tracker. All releases from 5.0.4 to 5.0.9 and from 6.0.0 to 6.0.2 are affected. Administrators should update to at least version 5.0.10 or 6.0.3, which contain the remediation, or to any later release that builds on those security patches.

Risk and Exploitability

The CVSS score of 5.1 indicates medium severity, and while EPSS data is not available, the flaw requires only that a user visit a malformed URL. The likely attack vector is a victim‑driven click on a malicious or socially engineered link, which can occur via phishing or compromised internal sites. Because the vulnerability enables arbitrary JavaScript execution in the browser context, an attacker can gain the victim’s session token or perform other malicious actions. The flaw is not currently listed in the CISA KEV catalog, suggesting no widespread exploit campaign has been documented, but the potential for misuse remains, warranting prompt remediation.

Generated by OpenCVE AI on May 21, 2026 at 13:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Request Tracker to version 5.0.10 or newer, or to 6.0.3 or newer, as provided in the vendor’s release notes.
  • Ensure that the "Page" parameter is properly encoded or escaped on output to remove reflected content, following standard XSS mitigation practices for the affected framework.
  • Implement a Content Security Policy that restricts JavaScript execution to trusted sources, reducing the impact of any remaining reflected input.

Generated by OpenCVE AI on May 21, 2026 at 13:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 21 May 2026 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Bestpractical
Bestpractical request Tracker
Vendors & Products Bestpractical
Bestpractical request Tracker

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 21 May 2026 12:30:00 +0000

Type Values Removed Values Added
Description Request Tracker is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the "Page" parameter in GET requests. An attacker can craft a URL that, when opened, results in arbitrary JavaScript execution in the victim’s browser. This vulnerability affects versions from 5.0.4 up to 5.0.9 and from 6.0.0 up to 6.0.2.
Title Reflected XSS in Request Tracker
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N'}


Subscriptions

Bestpractical Request Tracker
cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-PL

Published:

Updated: 2026-05-21T12:45:14.647Z

Reserved: 2026-04-22T07:09:40.481Z

Link: CVE-2026-6841

cve-icon Vulnrichment

Updated: 2026-05-21T12:45:10.308Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-21T13:16:20.273

Modified: 2026-05-21T16:04:33.830

Link: CVE-2026-6841

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-21T14:00:12Z

Weaknesses