CVE-2026-8194
Cross-Site Request Forgery in osTicket Dispatcher Component
Publication date: 2026-05-09
Last updated on: 2026-05-09
Assigner: VulDB
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| osticket | osticket | to 1.18.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-8194 is a Cross-Site Request Forgery (CSRF) protection bypass vulnerability in osTicket versions up to 1.18.3. The issue arises because the dispatcher component accepts HTTP method overrides via the _method parameter in the URL query string (GET requests), which bypasses CSRF token validation that only checks POST requests.
An attacker can exploit this by embedding a hidden image tag with a crafted URL containing the _method parameter in a support ticket. When a staff agent views the ticket, their browser sends a GET request that the dispatcher interprets as a state-changing HTTP method (like DELETE), causing the agent's session to perform unauthorized actions such as deleting notes or releasing ticket locks.
The root cause is that the dispatcher overrides the HTTP method before CSRF checks, and these checks only validate POST requests, leaving GET-based method overrides unprotected.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to perform unauthorized state-changing actions on behalf of authenticated staff members without their knowledge.
- Attackers can delete internal notes, saved searches, drafts, or release ticket locks by tricking staff agents into viewing maliciously crafted tickets.
- Because the exploit requires no authentication and triggers automatically when an agent views a ticket, it can lead to unauthorized data manipulation and disruption of ticket management workflows.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by monitoring HTTP requests for suspicious usage of the _method parameter in GET requests, especially those that attempt to override HTTP methods such as DELETE or PUT via query strings.
You can look for GET requests containing the _method parameter in your web server logs or network traffic, for example:
- Using grep on web server logs to find suspicious requests: grep '_method=' /var/log/apache2/access.log
- Using tcpdump or Wireshark to filter HTTP GET requests with _method parameter: tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep '_method='
Detecting such requests indicates potential exploitation attempts of the CSRF bypass vulnerability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability immediately, you should ensure that the osTicket dispatcher only accepts HTTP method overrides from POST parameters, not from GET query strings.
Specifically, apply the fix that restricts the _method override to the $_POST['_method'] parameter, which is already protected by CSRF token validation.
If an official patch or update is available, upgrade osTicket to a version that includes this fix.
As a temporary workaround, you can implement web application firewall (WAF) rules or server-side filters to block or log GET requests containing the _method parameter.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability CVE-2026-8194 allows an attacker to bypass CSRF protections and perform unauthorized state-changing actions on behalf of authenticated staff members in osTicket. This could lead to unauthorized modification or deletion of sensitive ticket data, potentially exposing or altering personal or protected information.
Such unauthorized actions and potential data integrity issues may impact compliance with standards and regulations like GDPR and HIPAA, which require protection of personal data and maintaining data integrity and confidentiality.
However, the provided information does not explicitly detail the direct compliance implications or specific regulatory impacts of this vulnerability.