Skip to main content

CVE-2025-45387: n/a

Medium
VulnerabilityCVE-2025-45387cvecve-2025-45387
Published: Mon Jun 02 2025 (06/02/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: n/a
Product: n/a

Description

osTicket prior to v1.17.6 and v1.18.2 are vulnerable to Broken Access Control Vulnerability in /scp/ajax.php.

AI-Powered Analysis

AILast updated: 07/11/2025, 07:48:15 UTC

Technical Analysis

CVE-2025-45387 is a medium severity vulnerability affecting osTicket versions prior to v1.17.6 and v1.18.2. The vulnerability is classified as a Broken Access Control issue located in the /scp/ajax.php endpoint. Broken Access Control vulnerabilities occur when an application does not properly enforce restrictions on authenticated users, allowing them to access resources or perform actions beyond their authorized privileges. In this case, the vulnerability requires the attacker to have some level of privileges (PR:L - Privileges Required: Low) and user interaction (UI:R - User Interaction Required). The attack vector is network-based (AV:N), meaning the vulnerability can be exploited remotely over the network. The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting other parts of the system. The impact includes low confidentiality and integrity impacts (C:L/I:L) with no impact on availability (A:N). The vulnerability is associated with CWE-79, which typically relates to Cross-Site Scripting (XSS), suggesting that the broken access control may enable injection or manipulation of scripts or data via the ajax.php interface. No known exploits are reported in the wild as of the publication date (2025-06-02). The lack of vendor or product-specific details limits the granularity of the analysis, but the affected software is osTicket, a widely used open-source support ticket system. The vulnerability likely allows an authenticated user with low privileges to perform unauthorized actions or access data through the ajax.php endpoint, potentially leading to information disclosure or unauthorized modifications within the ticketing system.

Potential Impact

For European organizations using osTicket for customer support or internal ticket management, this vulnerability poses a risk of unauthorized access or modification of sensitive support tickets or user data. Given that the vulnerability requires low privileges and user interaction, malicious insiders or compromised low-level accounts could exploit this flaw to escalate privileges or access restricted information. This could lead to data leakage of customer information, internal communications, or operational details, impacting confidentiality and integrity. While availability is not affected, the trustworthiness and security of the support system could be undermined, potentially causing reputational damage and compliance issues, especially under GDPR regulations that mandate protection of personal data. Organizations in sectors with high customer interaction, such as finance, healthcare, and public services, may face increased risks if attackers leverage this vulnerability to access sensitive support tickets or manipulate support workflows.

Mitigation Recommendations

European organizations should prioritize upgrading osTicket installations to versions 1.17.6 or 1.18.2 or later, where this vulnerability is patched. In the absence of immediate patching, organizations should implement strict access controls and monitor user activities on the /scp/ajax.php endpoint to detect anomalous behavior. Limiting the number of users with low-level privileges and enforcing strong authentication mechanisms can reduce the risk of exploitation. Additionally, applying web application firewalls (WAFs) with rules targeting suspicious AJAX requests may help mitigate exploitation attempts. Regular security audits and code reviews of customizations to osTicket should be conducted to ensure no additional access control weaknesses exist. Logging and alerting on unusual access patterns to the support portal can facilitate early detection of exploitation attempts. Finally, educating users about the risks of social engineering and ensuring minimal user interaction is required for sensitive operations can further reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-04-22T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 683ddf3a182aa0cae24e7e36

Added to database: 6/2/2025, 5:28:26 PM

Last enriched: 7/11/2025, 7:48:15 AM

Last updated: 8/10/2025, 7:01:33 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats