CVE-2026-23752
Received Received - Intake
Stored XSS in GFI HelpDesk Template Group Editing Allows Admin Script Injection

Publication date: 2026-04-20

Last updated on: 2026-04-27

Assigner: VulnCheck

Description
GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the template group creation and editing functionality that allows authenticated administrators to inject arbitrary JavaScript by manipulating the companyname POST parameter without HTML sanitization. Attackers can inject malicious scripts through the companyname field that execute in the browsers of any administrator viewing the Templates > Groups page.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gfi helpdesk to 4.99.9 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow attackers with authenticated administrator access to inject malicious JavaScript code that executes in other administrators' browsers when they view the affected page.

The impact includes potential compromise of administrator sessions or systems, which could lead to unauthorized actions or data exposure within the GFI HelpDesk environment.


Can you explain this vulnerability to me?

CVE-2026-23752 is a stored cross-site scripting (XSS) vulnerability in GFI HelpDesk versions before 4.99.9. It occurs in the template group creation and editing functionality, where the companyname POST parameter is not properly sanitized for HTML content.

Authenticated administrators can inject arbitrary JavaScript code into the companyname field. This malicious script then executes in the browsers of any administrator who views the Templates > Groups page, potentially compromising their session or system.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

Detection of this vulnerability involves checking for the presence of malicious JavaScript injected into the companyname POST parameter within the template group creation and editing functionality of GFI HelpDesk versions prior to 4.99.9.

Since the vulnerability is a stored cross-site scripting (XSS) issue triggered when an administrator views the Templates > Groups page, detection can include monitoring HTTP POST requests to the template group creation/editing endpoints for suspicious or unexpected JavaScript code in the companyname parameter.

  • Use web proxy tools (e.g., Burp Suite, OWASP ZAP) to intercept and inspect POST requests to the template group creation/editing URLs, focusing on the companyname parameter.
  • Search server logs or application logs for POST requests containing suspicious script tags or JavaScript code in the companyname field.
  • Run a manual test by submitting a benign JavaScript payload in the companyname field (e.g., <script>alert('XSS')</script>) as an authenticated administrator and then viewing the Templates > Groups page to see if the script executes.
  • Use command-line tools like curl to simulate POST requests with crafted payloads to the vulnerable endpoint, for example: curl -X POST -d "companyname=<script>alert('XSS')</script>" https://your-gfi-helpdesk-url/template-group-edit

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include preventing exploitation by restricting access and sanitizing inputs.

  • Upgrade GFI HelpDesk to version 4.99.9 or later where the vulnerability is fixed.
  • Limit administrative access to trusted users only, as the attack requires authenticated administrator privileges.
  • Implement input validation and sanitization on the companyname POST parameter to prevent injection of arbitrary JavaScript.
  • Educate administrators to avoid viewing the Templates > Groups page until the issue is resolved or mitigated.
  • Consider applying web application firewall (WAF) rules to detect and block malicious scripts in POST requests targeting the companyname parameter.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how the stored cross-site scripting vulnerability in GFI HelpDesk affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart