CVE-2026-8194
Received Received - Intake
Cross-Site Request Forgery in osTicket Dispatcher Component

Publication date: 2026-05-09

Last updated on: 2026-05-09

Assigner: VulDB

Description
A security vulnerability has been detected in osTicket up to 1.18.3. Impacted is an unknown function of the file include/class.dispatcher.php of the component Dispatcher. The manipulation of the argument _method leads to cross-site request forgery. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through a pull request but has not reacted yet.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-09
Last Modified
2026-05-09
Generated
2026-05-10
AI Q&A
2026-05-09
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
osticket osticket to 1.18.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
CWE-352 The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8194 is a Cross-Site Request Forgery (CSRF) protection bypass vulnerability in osTicket versions up to 1.18.3. The issue arises because the dispatcher component accepts HTTP method overrides via the _method parameter in the URL query string (GET requests), which bypasses CSRF token validation that only checks POST requests.

An attacker can exploit this by embedding a hidden image tag with a crafted URL containing the _method parameter in a support ticket. When a staff agent views the ticket, their browser sends a GET request that the dispatcher interprets as a state-changing HTTP method (like DELETE), causing the agent's session to perform unauthorized actions such as deleting notes or releasing ticket locks.

The root cause is that the dispatcher overrides the HTTP method before CSRF checks, and these checks only validate POST requests, leaving GET-based method overrides unprotected.


How can this vulnerability impact me? :

This vulnerability allows unauthenticated attackers to perform unauthorized state-changing actions on behalf of authenticated staff members without their knowledge.

  • Attackers can delete internal notes, saved searches, drafts, or release ticket locks by tricking staff agents into viewing maliciously crafted tickets.
  • Because the exploit requires no authentication and triggers automatically when an agent views a ticket, it can lead to unauthorized data manipulation and disruption of ticket management workflows.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring HTTP requests for suspicious usage of the _method parameter in GET requests, especially those that attempt to override HTTP methods such as DELETE or PUT via query strings.

You can look for GET requests containing the _method parameter in your web server logs or network traffic, for example:

  • Using grep on web server logs to find suspicious requests: grep '_method=' /var/log/apache2/access.log
  • Using tcpdump or Wireshark to filter HTTP GET requests with _method parameter: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '_method='

Detecting such requests indicates potential exploitation attempts of the CSRF bypass vulnerability.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability immediately, you should ensure that the osTicket dispatcher only accepts HTTP method overrides from POST parameters, not from GET query strings.

Specifically, apply the fix that restricts the _method override to the $_POST['_method'] parameter, which is already protected by CSRF token validation.

If an official patch or update is available, upgrade osTicket to a version that includes this fix.

As a temporary workaround, you can implement web application firewall (WAF) rules or server-side filters to block or log GET requests containing the _method parameter.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-8194 allows an attacker to bypass CSRF protections and perform unauthorized state-changing actions on behalf of authenticated staff members in osTicket. This could lead to unauthorized modification or deletion of sensitive ticket data, potentially exposing or altering personal or protected information.

Such unauthorized actions and potential data integrity issues may impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal data and maintaining data integrity and confidentiality.

However, the provided information does not explicitly detail the direct compliance implications or specific regulatory impacts of this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart