CVE-2026-48219
Reflected XSS in Open ISES Tickets
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-48219 is a reflected cross-site scripting (XSS) vulnerability found in Open ISES Tickets versions before 3.44.2. It occurs in the ics202.php file due to improper sanitization of the frm_add_str POST parameter. Authenticated attackers can inject arbitrary JavaScript code by passing malicious input through this parameter. When the server responds, the injected script executes in the victim's browser.
How can this vulnerability impact me? :
This vulnerability allows attackers to execute arbitrary JavaScript in the context of a victim's browser. This can lead to session hijacking, theft of sensitive information, or performing actions on behalf of the victim. Since the attacker must be authenticated, it targets users with access, potentially compromising their accounts or data.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring for suspicious POST requests to the ics202.php file that include the frm_add_str parameter containing potentially malicious JavaScript payloads. Since the vulnerability involves reflected cross-site scripting via an unsanitized POST parameter, inspecting HTTP traffic for such patterns is key.
A practical approach is to use network traffic analysis tools or web application firewalls (WAF) to log and analyze POST requests targeting ics202.php.
- Use curl or similar tools to manually test the endpoint with crafted payloads, for example: curl -X POST -d "frm_add_str=<script>alert(1)</script>" https://yourserver/ics202.php -v
- Use grep or similar commands on web server logs to search for suspicious frm_add_str parameter values: grep "frm_add_str=<script" /var/log/apache2/access.log
- Deploy automated vulnerability scanners that support detection of reflected XSS vulnerabilities targeting POST parameters.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to upgrade Open ISES Tickets to version 3.44.2 or later, where this reflected XSS vulnerability in ics202.php has been fixed.
Until an upgrade can be applied, consider implementing input validation or sanitization on the frm_add_str POST parameter to prevent injection of arbitrary JavaScript.
Additionally, deploying a web application firewall (WAF) with rules to detect and block reflected XSS payloads targeting the frm_add_str parameter can help reduce risk.
Ensure that users accessing the application are authenticated and monitor logs for suspicious activity related to this parameter.