CVE-2026-24415: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devcode-it openstamanager
OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.
AI Analysis
Technical Summary
CVE-2026-24415 is a reflected Cross-site Scripting (XSS) vulnerability identified in OpenSTAManager, an open-source management software used for technical assistance and invoicing. The vulnerability exists in versions 2.9.8 and earlier, specifically within the invoice, order, and contract modification modal dialogs. The root cause is the failure to properly sanitize user input from the 'righe' GET parameter before reflecting it in the HTML output. The parameter is directly echoed into an HTML attribute value without applying encoding functions such as htmlspecialchars(), allowing attackers to break out of the attribute context and inject arbitrary HTML or JavaScript code. This reflected XSS can be exploited by crafting malicious URLs that, when visited by authenticated or unauthenticated users, execute attacker-controlled scripts in the victim's browser context. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for initial access, but user interaction is needed to trigger the XSS. The impact affects confidentiality and integrity partially, with no direct availability impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user sessions and data within OpenSTAManager. Successful exploitation can allow attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, theft of sensitive information such as authentication tokens or personal data, unauthorized actions performed on behalf of the user, or redirection to malicious websites. Since OpenSTAManager is used for invoicing and technical assistance management, attackers could manipulate financial or contractual data or disrupt business operations by misleading users. Although the vulnerability requires user interaction, phishing or social engineering campaigns could facilitate exploitation. The reflected nature limits persistent impact but still poses significant risk to users who access maliciously crafted URLs. Organizations relying on OpenSTAManager may face reputational damage, financial loss, and regulatory compliance issues if sensitive data is compromised. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits.
Mitigation Recommendations
To mitigate CVE-2026-24415, organizations should immediately review and update their OpenSTAManager installations to versions beyond 2.9.8 once patches become available. In the absence of official patches, apply input validation and output encoding best practices by ensuring all user-supplied input, especially the 'righe' GET parameter, is properly sanitized using functions like htmlspecialchars() or equivalent before rendering in HTML contexts. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Educate users about the risks of clicking untrusted links and employ email filtering to detect phishing attempts. Additionally, monitor web application logs for suspicious requests containing unusual or encoded input in the 'righe' parameter. Consider deploying Web Application Firewalls (WAFs) with rules targeting reflected XSS payloads specific to OpenSTAManager. Regular security assessments and code reviews should be conducted to identify and remediate similar input validation issues proactively.
Affected Countries
United States, Germany, Italy, France, United Kingdom, Canada, Australia, Netherlands, Spain, Brazil
CVE-2026-24415: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devcode-it openstamanager
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.
AI-Powered Analysis
Technical Analysis
CVE-2026-24415 is a reflected Cross-site Scripting (XSS) vulnerability identified in OpenSTAManager, an open-source management software used for technical assistance and invoicing. The vulnerability exists in versions 2.9.8 and earlier, specifically within the invoice, order, and contract modification modal dialogs. The root cause is the failure to properly sanitize user input from the 'righe' GET parameter before reflecting it in the HTML output. The parameter is directly echoed into an HTML attribute value without applying encoding functions such as htmlspecialchars(), allowing attackers to break out of the attribute context and inject arbitrary HTML or JavaScript code. This reflected XSS can be exploited by crafting malicious URLs that, when visited by authenticated or unauthenticated users, execute attacker-controlled scripts in the victim's browser context. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for initial access, but user interaction is needed to trigger the XSS. The impact affects confidentiality and integrity partially, with no direct availability impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.
Potential Impact
The primary impact of this vulnerability is on the confidentiality and integrity of user sessions and data within OpenSTAManager. Successful exploitation can allow attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, theft of sensitive information such as authentication tokens or personal data, unauthorized actions performed on behalf of the user, or redirection to malicious websites. Since OpenSTAManager is used for invoicing and technical assistance management, attackers could manipulate financial or contractual data or disrupt business operations by misleading users. Although the vulnerability requires user interaction, phishing or social engineering campaigns could facilitate exploitation. The reflected nature limits persistent impact but still poses significant risk to users who access maliciously crafted URLs. Organizations relying on OpenSTAManager may face reputational damage, financial loss, and regulatory compliance issues if sensitive data is compromised. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits.
Mitigation Recommendations
To mitigate CVE-2026-24415, organizations should immediately review and update their OpenSTAManager installations to versions beyond 2.9.8 once patches become available. In the absence of official patches, apply input validation and output encoding best practices by ensuring all user-supplied input, especially the 'righe' GET parameter, is properly sanitized using functions like htmlspecialchars() or equivalent before rendering in HTML contexts. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Educate users about the risks of clicking untrusted links and employ email filtering to detect phishing attempts. Additionally, monitor web application logs for suspicious requests containing unusual or encoded input in the 'righe' parameter. Consider deploying Web Application Firewalls (WAFs) with rules targeting reflected XSS payloads specific to OpenSTAManager. Regular security assessments and code reviews should be conducted to identify and remediate similar input validation issues proactively.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-22T18:19:49.174Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a75aa5d1a09e29cb7e0992
Added to database: 3/3/2026, 10:03:17 PM
Last enriched: 3/3/2026, 10:17:33 PM
Last updated: 3/4/2026, 8:12:11 AM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28778: CWE-798 Use of Hard-coded Credentials in International Datacasting Corporation (IDC) IDC SFX2100 SuperFlex Satellite Receiver
HighCVE-2026-28775: CWE-1188: Insecure Default Initialization of Resource in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver
CriticalCVE-2026-28774: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
CriticalCVE-2026-28773: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
CriticalCVE-2026-28772: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in International Datacasting Corporation (IDC) SFX Series SuperFlex SatelliteReceiver Web Management Interface
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.