Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22200: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in Enhancesoft osTicket

0
High
VulnerabilityCVE-2026-22200cvecve-2026-22200cwe-74
Published: Mon Jan 12 2026 (01/12/2026, 18:34:12 UTC)
Source: CVE Database V5
Vendor/Project: Enhancesoft
Product: osTicket

Description

Enhancesoft osTicket versions up to and including 1.18.2 contain an arbitrary file read vulnerability in the ticket PDF export functionality. A remote attacker can submit a ticket containing crafted rich-text HTML that includes PHP filter expressions which are insufficiently sanitized before being processed by the mPDF PDF generator during export. When the attacker exports the ticket to PDF, the generated PDF can embed the contents of attacker-selected files from the server filesystem as bitmap images, allowing disclosure of sensitive local files in the context of the osTicket application user. This issue is exploitable in default configurations where guests may create tickets and access ticket status, or where self-registration is enabled.

AI-Powered Analysis

AILast updated: 01/12/2026, 19:08:28 UTC

Technical Analysis

CVE-2026-22200 is a vulnerability classified under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) affecting Enhancesoft osTicket versions up to and including 1.18.2. The flaw exists in the ticket PDF export functionality, where the application processes rich-text HTML submitted by users to generate PDF documents via the mPDF library. Attackers can craft ticket content embedding PHP filter expressions that are not properly sanitized before being passed to mPDF. This allows the PDF generator to read arbitrary files from the server filesystem and embed their contents as bitmap images within the exported PDF. Since the vulnerability can be triggered remotely without authentication—particularly in default configurations where guests can create tickets or self-registration is enabled—an attacker can exploit it to disclose sensitive files such as configuration files, credentials, or other critical data accessible to the web server user. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality with no required privileges or user interaction. Although no known exploits have been reported in the wild, the ease of exploitation and potential data exposure make this a significant threat. The lack of available patches at the time of reporting necessitates immediate mitigation efforts by affected organizations. This vulnerability highlights the risks of insufficient input sanitization in web applications that rely on third-party libraries for document generation.

Potential Impact

For European organizations, the arbitrary file read vulnerability in osTicket could lead to unauthorized disclosure of sensitive internal files, including configuration files, credentials, or personal data stored on the server. This compromises confidentiality and may facilitate further attacks such as privilege escalation or lateral movement within the network. Organizations using osTicket for customer support or internal ticketing risk exposure of sensitive customer information or internal operational data. The vulnerability’s remote, unauthenticated exploitability increases the attack surface, especially for public-facing ticketing portals. Data breaches resulting from this vulnerability could lead to regulatory penalties under GDPR due to unauthorized access to personal data. Additionally, reputational damage and operational disruption may occur if attackers leverage disclosed information to compromise other systems. The lack of known exploits currently provides a window for proactive defense, but the high CVSS score indicates a critical need for rapid response to prevent exploitation.

Mitigation Recommendations

1. Immediately restrict or disable guest ticket creation and self-registration features in osTicket to reduce the attack surface until a patch is available. 2. Implement strict input validation and sanitization on all user-submitted rich-text HTML content, specifically filtering or removing PHP filter expressions before processing. 3. Limit file system permissions of the web server user to the minimum necessary, preventing access to sensitive files that could be read via this vulnerability. 4. Monitor and audit ticket export activities for unusual or suspicious PDF generation requests that may indicate exploitation attempts. 5. If possible, disable or replace the mPDF library with a more secure PDF generation tool that properly handles input sanitization. 6. Apply web application firewall (WAF) rules to detect and block malicious payloads containing PHP filter expressions targeting the ticket export functionality. 7. Stay updated with Enhancesoft’s security advisories and apply official patches or updates as soon as they become available. 8. Conduct internal security reviews and penetration testing focused on ticketing systems to identify and remediate similar injection or file disclosure issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.184Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6965433ada2266e838fe6b2d

Added to database: 1/12/2026, 6:53:46 PM

Last enriched: 1/12/2026, 7:08:28 PM

Last updated: 1/13/2026, 7:16:33 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats