CVE-2026-48219
Deferred Deferred - Pending Action
Reflected XSS in Open ISES Tickets

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: VulnCheck

Description
Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in ics202.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the frm_add_str POST parameter directly into an HTML form hidden input value attribute. Attackers can craft a malicious request containing a JavaScript payload that executes in the victim's browser when the response is rendered.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-79 The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-48219 is a reflected cross-site scripting (XSS) vulnerability found in Open ISES Tickets versions before 3.44.2. It occurs in the ics202.php file due to improper sanitization of the frm_add_str POST parameter. Authenticated attackers can inject arbitrary JavaScript code by passing malicious input through this parameter. When the server responds, the injected script executes in the victim's browser.


How can this vulnerability impact me? :

This vulnerability allows attackers to execute arbitrary JavaScript in the context of a victim's browser. This can lead to session hijacking, theft of sensitive information, or performing actions on behalf of the victim. Since the attacker must be authenticated, it targets users with access, potentially compromising their accounts or data.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for suspicious POST requests to the ics202.php file that include the frm_add_str parameter containing potentially malicious JavaScript payloads. Since the vulnerability involves reflected cross-site scripting via an unsanitized POST parameter, inspecting HTTP traffic for such patterns is key.

A practical approach is to use network traffic analysis tools or web application firewalls (WAF) to log and analyze POST requests targeting ics202.php.

  • Use curl or similar tools to manually test the endpoint with crafted payloads, for example: curl -X POST -d "frm_add_str=<script>alert(1)</script>" https://yourserver/ics202.php -v
  • Use grep or similar commands on web server logs to search for suspicious frm_add_str parameter values: grep "frm_add_str=<script" /var/log/apache2/access.log
  • Deploy automated vulnerability scanners that support detection of reflected XSS vulnerabilities targeting POST parameters.

What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to upgrade Open ISES Tickets to version 3.44.2 or later, where this reflected XSS vulnerability in ics202.php has been fixed.

Until an upgrade can be applied, consider implementing input validation or sanitization on the frm_add_str POST parameter to prevent injection of arbitrary JavaScript.

Additionally, deploying a web application firewall (WAF) with rules to detect and block reflected XSS payloads targeting the frm_add_str parameter can help reduce risk.

Ensure that users accessing the application are authenticated and monitor logs for suspicious activity related to this parameter.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart