CVE-2026-48233
Deferred Deferred - Pending Action
SQL Injection in Open ISES Tickets

Publication date: 2026-05-21

Last updated on: 2026-05-21

Assigner: VulnCheck

Description
Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in ajax/sit_incidents.php where the offset GET parameter is concatenated into the LIMIT clause of a SELECT statement without sanitization. Authenticated attackers can craft requests that alter query semantics to read, modify, or destroy database contents.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-21
Last Modified
2026-05-21
Generated
2026-05-22
AI Q&A
2026-05-21
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-89 The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Open ISES Tickets versions before 3.44.2 contain a SQL injection vulnerability in the file ajax/sit_incidents.php. This vulnerability occurs because the 'offset' GET parameter is directly concatenated into the LIMIT clause of a SQL SELECT statement without proper sanitization.

As a result, authenticated attackers can craft malicious requests that alter the intended SQL query, allowing them to manipulate the database queries.

This manipulation can enable attackers to read, modify, or delete database contents, potentially compromising the integrity and confidentiality of the data.


How can this vulnerability impact me? :

This vulnerability can have serious impacts including unauthorized access to sensitive data, modification of database records, or deletion of important information.

Since attackers can alter database queries, they might extract confidential information, corrupt data integrity, or disrupt application functionality.

Such impacts can lead to data breaches, loss of trust, operational downtime, and potential financial or reputational damage.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability involves an SQL injection via the 'offset' GET parameter in ajax/sit_incidents.php in Open ISES Tickets versions below 3.44.2. Detection can involve monitoring HTTP requests to this endpoint for unusual or crafted 'offset' parameter values that attempt to manipulate SQL queries.

You can detect potential exploitation attempts by capturing and analyzing web server logs or network traffic for suspicious requests to ajax/sit_incidents.php with unusual 'offset' parameter values.

Example commands to detect such activity might include:

  • Using grep on web server logs to find requests with the 'offset' parameter: grep 'offset=' /var/log/apache2/access.log
  • Using tcpdump or tshark to capture HTTP traffic and filter for requests to ajax/sit_incidents.php: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'ajax/sit_incidents.php'
  • Using a web application firewall (WAF) or IDS/IPS with rules to detect SQL injection patterns in the 'offset' parameter.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to update Open ISES Tickets to version 3.44.2 or later, where this SQL injection vulnerability has been fixed.

If immediate updating is not possible, applying any available patches provided by the vendor for this vulnerability is recommended.

Additionally, restricting access to the vulnerable endpoint ajax/sit_incidents.php to trusted authenticated users and implementing input validation or web application firewall rules to block malicious 'offset' parameter values can help reduce risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The SQL injection vulnerability in Open ISES Tickets before version 3.44.2 allows authenticated attackers to read, modify, or delete database contents. Such unauthorized access and manipulation of data can lead to breaches of sensitive information, which may result in non-compliance with data protection regulations like GDPR and HIPAA that require safeguarding personal and health-related data.

Failure to address this vulnerability could expose organizations to regulatory penalties due to compromised confidentiality, integrity, and availability of protected data.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart