CVE-2026-2545
Unknown Unknown - Not Provided
Cross-Site Scripting in LigeroSmart AgentTicketSearch Component

Publication date: 2026-02-16

Last updated on: 2026-04-29

Assigner: VulDB

Description
A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the file /otrs/index.pl?Action=AgentTicketSearch. This manipulation of the argument Profile causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-16
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-16
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
ligerosmart ligerosmart to 6.1.26 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CWE-94 The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2545 is a reflected Cross-Site Scripting (XSS) vulnerability found in LigeroSmart versions up to 6.1.26, specifically in the AgentTicketSearch functionality accessed via the URL path `/otrs/index.pl` with the parameter `Profile`.'}, {'type': 'paragraph', 'content': "The vulnerability occurs because the application does not properly sanitize or encode user input in the `Profile` parameter, allowing an attacker to inject malicious JavaScript code that is reflected back in the server's response."}, {'type': 'paragraph', 'content': "An attacker can craft a specially crafted HTTP GET request containing a script injection payload in the `Profile` parameter, which when executed in the victim's browser, can lead to arbitrary script execution."}, {'type': 'paragraph', 'content': 'This attack requires the victim to interact with the malicious link and affects authenticated users of the LigeroSmart application.'}] [2, 3, 4]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This reflected XSS vulnerability can allow attackers to execute arbitrary JavaScript in the context of authenticated users' browsers."}, {'type': 'list_item', 'content': 'Session hijacking, allowing attackers to steal or impersonate user sessions.'}, {'type': 'list_item', 'content': 'Credential theft by capturing sensitive information entered by users.'}, {'type': 'list_item', 'content': 'Unauthorized actions performed on behalf of authenticated users, potentially leading to data manipulation or privilege escalation.'}, {'type': 'list_item', 'content': 'Defacement or manipulation of the web interface seen by users.'}, {'type': 'paragraph', 'content': 'Since the vulnerability requires user interaction and authentication, the impact is limited to users who access the vulnerable functionality while authenticated.'}] [2, 3, 4]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by sending crafted HTTP GET requests to the vulnerable LigeroSmart endpoint and observing if the injected script is reflected in the response without proper sanitization.'}, {'type': 'paragraph', 'content': 'A typical detection method involves using curl or similar HTTP clients to send a request with a malicious payload in the Profile parameter and checking for the script execution or reflected payload in the response.'}, {'type': 'list_item', 'content': 'Example curl command to test the vulnerability: curl -i "http://localhost:9090/otrs/index.pl?Action=AgentTicketSearch;Subaction=Search;TakeLastSearch=1;SaveProfile=1;Profile=1%3C%2Fscript%3E%3Cscript%3Ealert(7777)%3C%2Fscript%3E"'}, {'type': 'list_item', 'content': 'Look for the injected script alert(7777) or the payload reflected in the HTTP response body indicating the presence of the reflected XSS vulnerability.'}] [2, 4]


What immediate steps should I take to mitigate this vulnerability?

Currently, no official patch or mitigation has been provided by the LigeroSmart project as they have not responded to the issue report.

Immediate mitigation steps include restricting access to the vulnerable endpoint to trusted users only, especially since exploitation requires authentication.

Avoid using the vulnerable versions of LigeroSmart (up to 6.1.26) if possible, or consider alternative products until a fix is available.

Implement web application firewall (WAF) rules to detect and block malicious payloads targeting the Profile parameter in requests to /otrs/index.pl.

Educate users to be cautious of suspicious links that may exploit this reflected XSS vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart