Open ISES Tickets before 3.44.2 contains a SQL injection vulnerability in ajax/reports.php where the tick_id POST parameter is concatenated into the WHERE clause of SELECT statements in the incidents summary report without sanitization. Authenticated attackers can craft requests that alter query semantics to read, modify, or destroy database contents.
https://github.com/openises/tickets/releases/tag/v3.44.2
https://github.com/openises/tickets/commit/ecfeb406a016766cae81c749e14b5145a9f2dbff
Published: 2026-05-21
Updated: 2026-05-21
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:P/A:N
Severity: High
Base Score: 7.1
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Severity: High
Base Score: 7.1
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
Severity: High