CVE-2026-2545
Cross-Site Scripting in LigeroSmart AgentTicketSearch Component
Publication date: 2026-02-16
Last updated on: 2026-04-29
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ligerosmart | ligerosmart | to 6.1.26 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
| CWE-94 | The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-2545 is a reflected Cross-Site Scripting (XSS) vulnerability found in LigeroSmart versions up to 6.1.26, specifically in the AgentTicketSearch functionality accessed via the URL path `/otrs/index.pl` with the parameter `Profile`.'}, {'type': 'paragraph', 'content': "The vulnerability occurs because the application does not properly sanitize or encode user input in the `Profile` parameter, allowing an attacker to inject malicious JavaScript code that is reflected back in the server's response."}, {'type': 'paragraph', 'content': "An attacker can craft a specially crafted HTTP GET request containing a script injection payload in the `Profile` parameter, which when executed in the victim's browser, can lead to arbitrary script execution."}, {'type': 'paragraph', 'content': 'This attack requires the victim to interact with the malicious link and affects authenticated users of the LigeroSmart application.'}] [2, 3, 4]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': "This reflected XSS vulnerability can allow attackers to execute arbitrary JavaScript in the context of authenticated users' browsers."}, {'type': 'list_item', 'content': 'Session hijacking, allowing attackers to steal or impersonate user sessions.'}, {'type': 'list_item', 'content': 'Credential theft by capturing sensitive information entered by users.'}, {'type': 'list_item', 'content': 'Unauthorized actions performed on behalf of authenticated users, potentially leading to data manipulation or privilege escalation.'}, {'type': 'list_item', 'content': 'Defacement or manipulation of the web interface seen by users.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires user interaction and authentication, the impact is limited to users who access the vulnerable functionality while authenticated.'}] [2, 3, 4]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable LigeroSmart endpoint and observing if the injected script is reflected in the response without proper sanitization.'}, {'type': 'paragraph', 'content': 'A typical detection method involves using curl or similar HTTP clients to send a request with a malicious payload in the Profile parameter and checking for the script execution or reflected payload in the response.'}, {'type': 'list_item', 'content': 'Example curl command to test the vulnerability: curl -i "http://localhost:9090/otrs/index.pl?Action=AgentTicketSearch;Subaction=Search;TakeLastSearch=1;SaveProfile=1;Profile=1%3C%2Fscript%3E%3Cscript%3Ealert(7777)%3C%2Fscript%3E"'}, {'type': 'list_item', 'content': 'Look for the injected script alert(7777) or the payload reflected in the HTTP response body indicating the presence of the reflected XSS vulnerability.'}] [2, 4]
What immediate steps should I take to mitigate this vulnerability?
Currently, no official patch or mitigation has been provided by the LigeroSmart project as they have not responded to the issue report.
Immediate mitigation steps include restricting access to the vulnerable endpoint to trusted users only, especially since exploitation requires authentication.
Avoid using the vulnerable versions of LigeroSmart (up to 6.1.26) if possible, or consider alternative products until a fix is available.
Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the Profile parameter in requests to /otrs/index.pl.
Educate users to be cautious of suspicious links that may exploit this reflected XSS vulnerability.