CVE-2025-45387: n/a
osTicket prior to v1.17.6 and v1.18.2 are vulnerable to Broken Access Control Vulnerability in /scp/ajax.php.
AI Analysis
Technical Summary
CVE-2025-45387 is a medium severity vulnerability affecting osTicket versions prior to v1.17.6 and v1.18.2. The vulnerability is classified as a Broken Access Control issue located in the /scp/ajax.php endpoint. Broken Access Control vulnerabilities occur when an application does not properly enforce restrictions on authenticated users, allowing them to access resources or perform actions beyond their authorized privileges. In this case, the vulnerability requires the attacker to have some level of privileges (PR:L - Privileges Required: Low) and user interaction (UI:R - User Interaction Required). The attack vector is network-based (AV:N), meaning the vulnerability can be exploited remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system. The impact includes low confidentiality and integrity impacts (C:L/I:L) with no impact on availability (A:N). The vulnerability is associated with CWE-79, which typically relates to Cross-Site Scripting (XSS), suggesting that the broken access control may enable injection or manipulation of scripts or data via the ajax.php interface. No known exploits are reported in the wild as of the publication date (2025-06-02). The lack of vendor or product-specific details limits the granularity of the analysis, but the affected software is osTicket, a widely used open-source support ticket system. The vulnerability likely allows an authenticated user with low privileges to perform unauthorized actions or access data through the ajax.php endpoint, potentially leading to information disclosure or unauthorized modifications within the ticketing system.
Potential Impact
For European organizations using osTicket for customer support or internal ticket management, this vulnerability poses a risk of unauthorized access or modification of sensitive support tickets or user data. Given that the vulnerability requires low privileges and user interaction, malicious insiders or compromised low-level accounts could exploit this flaw to escalate privileges or access restricted information. This could lead to data leakage of customer information, internal communications, or operational details, impacting confidentiality and integrity. While availability is not affected, the trustworthiness and security of the support system could be undermined, potentially causing reputational damage and compliance issues, especially under GDPR regulations that mandate protection of personal data. Organizations in sectors with high customer interaction, such as finance, healthcare, and public services, may face increased risks if attackers leverage this vulnerability to access sensitive support tickets or manipulate support workflows.
Mitigation Recommendations
European organizations should prioritize upgrading osTicket installations to versions 1.17.6 or 1.18.2 or later, where this vulnerability is patched. In the absence of immediate patching, organizations should implement strict access controls and monitor user activities on the /scp/ajax.php endpoint to detect anomalous behavior. Limiting the number of users with low-level privileges and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, applying web application firewalls (WAFs) with rules targeting suspicious AJAX requests may help mitigate exploitation attempts. Regular security audits and code reviews of customizations to osTicket should be conducted to ensure no additional access control weaknesses exist. Logging and alerting on unusual access patterns to the support portal can facilitate early detection of exploitation attempts. Finally, educating users about the risks of social engineering and ensuring minimal user interaction is required for sensitive operations can further reduce exposure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-45387: n/a
Description
osTicket prior to v1.17.6 and v1.18.2 are vulnerable to Broken Access Control Vulnerability in /scp/ajax.php.
AI-Powered Analysis
Technical Analysis
CVE-2025-45387 is a medium severity vulnerability affecting osTicket versions prior to v1.17.6 and v1.18.2. The vulnerability is classified as a Broken Access Control issue located in the /scp/ajax.php endpoint. Broken Access Control vulnerabilities occur when an application does not properly enforce restrictions on authenticated users, allowing them to access resources or perform actions beyond their authorized privileges. In this case, the vulnerability requires the attacker to have some level of privileges (PR:L - Privileges Required: Low) and user interaction (UI:R - User Interaction Required). The attack vector is network-based (AV:N), meaning the vulnerability can be exploited remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system. The impact includes low confidentiality and integrity impacts (C:L/I:L) with no impact on availability (A:N). The vulnerability is associated with CWE-79, which typically relates to Cross-Site Scripting (XSS), suggesting that the broken access control may enable injection or manipulation of scripts or data via the ajax.php interface. No known exploits are reported in the wild as of the publication date (2025-06-02). The lack of vendor or product-specific details limits the granularity of the analysis, but the affected software is osTicket, a widely used open-source support ticket system. The vulnerability likely allows an authenticated user with low privileges to perform unauthorized actions or access data through the ajax.php endpoint, potentially leading to information disclosure or unauthorized modifications within the ticketing system.
Potential Impact
For European organizations using osTicket for customer support or internal ticket management, this vulnerability poses a risk of unauthorized access or modification of sensitive support tickets or user data. Given that the vulnerability requires low privileges and user interaction, malicious insiders or compromised low-level accounts could exploit this flaw to escalate privileges or access restricted information. This could lead to data leakage of customer information, internal communications, or operational details, impacting confidentiality and integrity. While availability is not affected, the trustworthiness and security of the support system could be undermined, potentially causing reputational damage and compliance issues, especially under GDPR regulations that mandate protection of personal data. Organizations in sectors with high customer interaction, such as finance, healthcare, and public services, may face increased risks if attackers leverage this vulnerability to access sensitive support tickets or manipulate support workflows.
Mitigation Recommendations
European organizations should prioritize upgrading osTicket installations to versions 1.17.6 or 1.18.2 or later, where this vulnerability is patched. In the absence of immediate patching, organizations should implement strict access controls and monitor user activities on the /scp/ajax.php endpoint to detect anomalous behavior. Limiting the number of users with low-level privileges and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, applying web application firewalls (WAFs) with rules targeting suspicious AJAX requests may help mitigate exploitation attempts. Regular security audits and code reviews of customizations to osTicket should be conducted to ensure no additional access control weaknesses exist. Logging and alerting on unusual access patterns to the support portal can facilitate early detection of exploitation attempts. Finally, educating users about the risks of social engineering and ensuring minimal user interaction is required for sensitive operations can further reduce exposure.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 683ddf3a182aa0cae24e7e36
Added to database: 6/2/2025, 5:28:26 PM
Last enriched: 7/11/2025, 7:48:15 AM
Last updated: 1/7/2026, 4:19:10 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.