CVE-2026-22200: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Enhancesoft osTicket
Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.
AI Analysis
Technical Summary
CVE-2026-22200 is an arbitrary file read vulnerability classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) affecting Enhancesoft osTicket versions 1.17.x prior to 1.17.7 and 1.18.x prior to 1.18.3. The vulnerability stems from insufficient sanitization of rich-text HTML input submitted by users when creating tickets. Attackers can embed PHP filter expressions within the HTML content, which are not properly neutralized before being processed by the mPDF PDF generator during the export of tickets to PDF format. When the export function is invoked, the mPDF library interprets these PHP filters and can embed arbitrary server-side files as bitmap images within the generated PDF document. This results in unauthorized disclosure of sensitive files from the server's filesystem, such as configuration files, credentials, or other confidential data accessible to the osTicket application user context. The flaw is exploitable remotely without authentication or user interaction, particularly in default osTicket configurations where guests can create tickets or self-registration is enabled. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity due to network attack vector, no required privileges or user interaction, and a high confidentiality impact. No known exploits are currently reported in the wild, but the ease of exploitation and potential data exposure make this a critical risk. The vulnerability affects organizations relying on osTicket for customer support or internal ticketing, potentially exposing sensitive operational or personal data. The lack of patches at the time of reporting necessitates immediate attention to upgrade to fixed versions 1.17.7 or 1.18.3 once available or implement compensating controls to restrict guest ticket creation and self-registration features.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data leakage from internal or customer support systems running vulnerable osTicket versions. The arbitrary file read can expose configuration files, credentials, or other sensitive documents stored on the server, potentially leading to further compromise or data breaches. Organizations in sectors with strict data protection regulations such as finance, healthcare, and government are particularly vulnerable due to the potential exposure of personal or confidential information, risking non-compliance with GDPR and other privacy laws. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks targeting exposed osTicket instances. This can undermine trust in customer support services and disrupt operations if sensitive information is leaked or used for subsequent attacks. The impact extends to reputational damage, regulatory penalties, and operational disruptions. Given osTicket's widespread use in European SMEs and public sector entities for helpdesk functions, the vulnerability could affect a broad range of organizations if not promptly addressed.
Mitigation Recommendations
1. Upgrade osTicket installations immediately to versions 1.17.7 or 1.18.3 where the vulnerability is patched. 2. If immediate upgrade is not feasible, disable or restrict guest ticket creation and self-registration features to limit attack surface. 3. Implement strict input validation and sanitization on ticket submission forms, especially for rich-text HTML content, to block PHP filter expressions or other special elements. 4. Configure web application firewalls (WAFs) to detect and block suspicious payloads containing PHP filters or unusual HTML tags in ticket submissions. 5. Monitor logs for unusual ticket creation patterns or PDF export requests that may indicate exploitation attempts. 6. Restrict file system permissions for the osTicket application user to minimize access to sensitive files that could be disclosed. 7. Conduct regular security assessments and penetration tests focusing on ticketing systems and PDF export functionalities. 8. Educate support staff to recognize and report suspicious tickets or export activities. 9. Maintain an incident response plan to quickly address any detected exploitation or data leakage. 10. Follow vendor advisories for any additional patches or mitigation guidance.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden
CVE-2026-22200: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Enhancesoft osTicket
Description
Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.
AI-Powered Analysis
Technical Analysis
CVE-2026-22200 is an arbitrary file read vulnerability classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) affecting Enhancesoft osTicket versions 1.17.x prior to 1.17.7 and 1.18.x prior to 1.18.3. The vulnerability stems from insufficient sanitization of rich-text HTML input submitted by users when creating tickets. Attackers can embed PHP filter expressions within the HTML content, which are not properly neutralized before being processed by the mPDF PDF generator during the export of tickets to PDF format. When the export function is invoked, the mPDF library interprets these PHP filters and can embed arbitrary server-side files as bitmap images within the generated PDF document. This results in unauthorized disclosure of sensitive files from the server's filesystem, such as configuration files, credentials, or other confidential data accessible to the osTicket application user context. The flaw is exploitable remotely without authentication or user interaction, particularly in default osTicket configurations where guests can create tickets or self-registration is enabled. The vulnerability has a CVSS 4.0 base score of 8.7, indicating high severity due to network attack vector, no required privileges or user interaction, and a high confidentiality impact. No known exploits are currently reported in the wild, but the ease of exploitation and potential data exposure make this a critical risk. The vulnerability affects organizations relying on osTicket for customer support or internal ticketing, potentially exposing sensitive operational or personal data. The lack of patches at the time of reporting necessitates immediate attention to upgrade to fixed versions 1.17.7 or 1.18.3 once available or implement compensating controls to restrict guest ticket creation and self-registration features.
Potential Impact
For European organizations, this vulnerability poses a significant risk of sensitive data leakage from internal or customer support systems running vulnerable osTicket versions. The arbitrary file read can expose configuration files, credentials, or other sensitive documents stored on the server, potentially leading to further compromise or data breaches. Organizations in sectors with strict data protection regulations such as finance, healthcare, and government are particularly vulnerable due to the potential exposure of personal or confidential information, risking non-compliance with GDPR and other privacy laws. The ease of exploitation without authentication or user interaction increases the likelihood of automated attacks targeting exposed osTicket instances. This can undermine trust in customer support services and disrupt operations if sensitive information is leaked or used for subsequent attacks. The impact extends to reputational damage, regulatory penalties, and operational disruptions. Given osTicket's widespread use in European SMEs and public sector entities for helpdesk functions, the vulnerability could affect a broad range of organizations if not promptly addressed.
Mitigation Recommendations
1. Upgrade osTicket installations immediately to versions 1.17.7 or 1.18.3 where the vulnerability is patched. 2. If immediate upgrade is not feasible, disable or restrict guest ticket creation and self-registration features to limit attack surface. 3. Implement strict input validation and sanitization on ticket submission forms, especially for rich-text HTML content, to block PHP filter expressions or other special elements. 4. Configure web application firewalls (WAFs) to detect and block suspicious payloads containing PHP filters or unusual HTML tags in ticket submissions. 5. Monitor logs for unusual ticket creation patterns or PDF export requests that may indicate exploitation attempts. 6. Restrict file system permissions for the osTicket application user to minimize access to sensitive files that could be disclosed. 7. Conduct regular security assessments and penetration tests focusing on ticketing systems and PDF export functionalities. 8. Educate support staff to recognize and report suspicious tickets or export activities. 9. Maintain an incident response plan to quickly address any detected exploitation or data leakage. 10. Follow vendor advisories for any additional patches or mitigation guidance.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2026-01-06T16:47:17.184Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6965433ada2266e838fe6b2d
Added to database: 1/12/2026, 6:53:46 PM
Last enriched: 1/26/2026, 7:36:31 PM
Last updated: 2/7/2026, 2:57:46 AM
Views: 110
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.