CVE-2026-48222
Reflected XSS in Open ISES Tickets via frm_add_str Parameter
Publication date: 2026-05-21
Last updated on: 2026-05-21
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-79 | The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-48222 is a reflected cross-site scripting (XSS) vulnerability found in Open ISES Tickets versions before 3.44.2, specifically in the ics213.php file.
The vulnerability occurs because the frm_add_str POST parameter is not properly sanitized, allowing authenticated attackers to inject arbitrary JavaScript code.
When a victim's browser renders the response containing the injected code, the malicious JavaScript executes, potentially leading to security risks.
How can this vulnerability impact me? :
This vulnerability can allow attackers to execute arbitrary JavaScript in the context of a victim's browser session.
- It may lead to theft of sensitive information such as session cookies or credentials.
- Attackers could perform actions on behalf of the victim within the application.
- It can facilitate further attacks like phishing or spreading malware.
Overall, it poses a medium severity risk that can compromise user security and trust.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring HTTP POST requests to the ics213.php file, specifically looking for the frm_add_str parameter containing suspicious or malicious JavaScript payloads. Since the vulnerability requires authentication, detection should focus on authenticated sessions.
A practical approach is to capture and analyze web traffic to identify POST requests to ics213.php with the frm_add_str parameter. For example, using command-line tools like curl or wget to send crafted requests or using network monitoring tools to inspect traffic.
- Use curl to test for injection: curl -X POST -d "frm_add_str=<script>alert(1)</script>" https://target/ics213.php -b cookies.txt
- Use a web proxy or interception tool (e.g., Burp Suite) to capture and modify POST requests to ics213.php and observe if injected scripts execute in the response.
- Check server logs for unusual POST requests to ics213.php containing script tags or suspicious input in frm_add_str.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update Open ISES Tickets to version 3.44.2 or later, where this vulnerability has been fixed.
Until the update can be applied, restrict access to the affected ics213.php endpoint to trusted users only and monitor for suspicious activity.
Implement web application firewall (WAF) rules to detect and block attempts to inject JavaScript via the frm_add_str POST parameter.
Educate authenticated users about the risk of reflected XSS and encourage cautious behavior when interacting with the application.