Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22200: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Enhancesoft osTicket

0
High
VulnerabilityCVE-2026-22200cvecve-2026-22200cwe-74
Published: Mon Jan 12 2026 (01/12/2026, 18:34:12 UTC)
Source: CVE Database V5
Vendor/Project: Enhancesoft
Product: osTicket

Description

Enhancesoft osTicket versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:35:08 UTC

Technical Analysis

CVE-2026-22200 is a vulnerability in Enhancesoft osTicket, specifically affecting versions 1.18.x prior to 1.18.3 and 1.17.x prior to 1.17.7. The issue arises in the ticket PDF export feature, which utilizes the mPDF library to generate PDF documents from ticket content. Attackers can submit tickets containing malicious rich-text HTML that includes PHP filter expressions. These expressions are not properly sanitized before being processed by mPDF, allowing the attacker to manipulate the PDF generation process to embed arbitrary files from the server filesystem as bitmap images within the exported PDF. This results in an arbitrary file read vulnerability, enabling disclosure of sensitive files accessible to the osTicket application user context. The vulnerability is exploitable remotely without authentication or user interaction, especially in default configurations where guest ticket creation or self-registration is enabled. The root cause is improper neutralization of special elements in output (CWE-74), leading to injection of malicious content into a downstream component (mPDF). No patches are linked yet, and no known exploits are reported in the wild, but the high CVSS score (8.7) reflects the significant confidentiality impact and ease of exploitation.

Potential Impact

The primary impact of CVE-2026-22200 is unauthorized disclosure of sensitive local files on servers running vulnerable osTicket versions. Attackers can read arbitrary files accessible by the application, potentially exposing configuration files, credentials, internal documents, or other sensitive data. This compromises confidentiality and may facilitate further attacks such as privilege escalation or lateral movement. Since exploitation requires no authentication or user interaction, the attack surface is broad, especially on publicly accessible ticketing portals with guest ticket creation or self-registration enabled. Organizations relying on osTicket for customer support or internal ticketing may face data breaches, regulatory compliance violations, and reputational damage. The vulnerability does not directly affect integrity or availability but can be a stepping stone for more damaging attacks. The lack of known exploits in the wild suggests limited current active exploitation, but the ease of exploitation and high impact warrant urgent attention.

Mitigation Recommendations

To mitigate CVE-2026-22200, organizations should upgrade osTicket to versions 1.18.3 or later, or 1.17.7 or later, once patches are available. Until patches are released, administrators should consider disabling the PDF export functionality or restricting it to trusted users only. Implement strict input validation and sanitization on ticket content, especially for rich-text HTML inputs, to prevent injection of PHP filter expressions. Restrict guest ticket creation and self-registration features to reduce exposure. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious payloads containing PHP filters or unusual HTML content. Regularly audit server filesystem permissions to minimize sensitive file exposure to the osTicket application user. Monitor logs for abnormal ticket submissions or PDF export requests. Finally, maintain a robust incident response plan to quickly address any detected exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.184Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6965433ada2266e838fe6b2d

Added to database: 1/12/2026, 6:53:46 PM

Last enriched: 3/24/2026, 12:35:08 AM

Last updated: 3/25/2026, 3:58:56 PM

Views: 169

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses