CVE-2026-48214
Deferred Deferred - Pending Action
Reflected XSS in Open ISES Tickets

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: VulnCheck

Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in add_nm.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id POST parameter directly into an HTML form input value attribute and an inline JavaScript string literal. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-48214 is a reflected cross-site scripting (XSS) vulnerability found in Open ISES Tickets versions before 3.44.2, specifically in the add_nm.php file.

Authenticated attackers can exploit this vulnerability by injecting arbitrary JavaScript code through the ticket_id POST parameter, which is not properly sanitized.

The injected JavaScript is directly inserted into an HTML form input value attribute and an inline JavaScript string literal, causing the malicious code to execute in the victim's browser when the response is rendered.


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary JavaScript in the context of a victim's browser, which can lead to several impacts.

  • The attacker can steal sensitive information such as session cookies or authentication tokens.
  • It can enable attackers to perform actions on behalf of the victim within the application.
  • It may lead to further attacks like phishing or spreading malware by manipulating the content displayed to the user.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP POST requests to the add_nm.php endpoint, specifically looking for the ticket_id parameter containing suspicious or malicious JavaScript payloads.

A practical approach is to capture and inspect POST requests to add_nm.php for unsanitized input in the ticket_id parameter that might be reflected in the response.

Example commands to detect potential exploitation attempts include using curl or tools like Burp Suite or OWASP ZAP to send crafted POST requests and observe the response for reflected scripts.

  • curl -X POST -d "ticket_id=<script>alert(1)</script>" https://your-target-domain/add_nm.php -v
  • Use a web proxy tool (e.g., Burp Suite) to intercept and modify ticket_id POST parameters to include JavaScript payloads and check if they are reflected unsanitized in the response.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Open ISES Tickets to version 3.44.2 or later, where this reflected XSS vulnerability has been fixed.

Until the upgrade can be applied, restrict access to the affected add_nm.php endpoint to trusted authenticated users only, and consider implementing web application firewall (WAF) rules to block suspicious payloads in the ticket_id parameter.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this reflected cross-site scripting (XSS) vulnerability in Open ISES Tickets affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart