Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24415: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in devcode-it openstamanager

0
Medium
VulnerabilityCVE-2026-24415cvecve-2026-24415cwe-79
Published: Tue Mar 03 2026 (03/03/2026, 21:51:41 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contains Reflected XSS vulnerabilities in invoice/order/contract modification modals. The application fails to properly sanitize user-supplied input from the righe GET parameter before reflecting it in HTML output.The $_GET['righe'] parameter is directly echoed into the HTML value attribute without any sanitization using htmlspecialchars() or equivalent functions. This allows an attacker to break out of the attribute context and inject arbitrary HTML/JavaScript.

AI-Powered Analysis

AILast updated: 03/03/2026, 22:17:33 UTC

Technical Analysis

CVE-2026-24415 is a reflected Cross-site Scripting (XSS) vulnerability identified in OpenSTAManager, an open-source management software used for technical assistance and invoicing. The vulnerability exists in versions 2.9.8 and earlier, specifically within the invoice, order, and contract modification modal dialogs. The root cause is the failure to properly sanitize user input from the 'righe' GET parameter before reflecting it in the HTML output. The parameter is directly echoed into an HTML attribute value without applying encoding functions such as htmlspecialchars(), allowing attackers to break out of the attribute context and inject arbitrary HTML or JavaScript code. This reflected XSS can be exploited by crafting malicious URLs that, when visited by authenticated or unauthenticated users, execute attacker-controlled scripts in the victim's browser context. The vulnerability does not require authentication but does require user interaction (clicking a malicious link). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required for initial access, but user interaction is needed to trigger the XSS. The impact affects confidentiality and integrity partially, with no direct availability impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability is classified under CWE-79, which covers improper neutralization of input during web page generation leading to XSS.

Potential Impact

The primary impact of this vulnerability is on the confidentiality and integrity of user sessions and data within OpenSTAManager. Successful exploitation can allow attackers to execute arbitrary JavaScript in the context of the victim’s browser, potentially leading to session hijacking, theft of sensitive information such as authentication tokens or personal data, unauthorized actions performed on behalf of the user, or redirection to malicious websites. Since OpenSTAManager is used for invoicing and technical assistance management, attackers could manipulate financial or contractual data or disrupt business operations by misleading users. Although the vulnerability requires user interaction, phishing or social engineering campaigns could facilitate exploitation. The reflected nature limits persistent impact but still poses significant risk to users who access maliciously crafted URLs. Organizations relying on OpenSTAManager may face reputational damage, financial loss, and regulatory compliance issues if sensitive data is compromised. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as public disclosure may prompt attackers to develop exploits.

Mitigation Recommendations

To mitigate CVE-2026-24415, organizations should immediately review and update their OpenSTAManager installations to versions beyond 2.9.8 once patches become available. In the absence of official patches, apply input validation and output encoding best practices by ensuring all user-supplied input, especially the 'righe' GET parameter, is properly sanitized using functions like htmlspecialchars() or equivalent before rendering in HTML contexts. Implement Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of XSS attacks. Educate users about the risks of clicking untrusted links and employ email filtering to detect phishing attempts. Additionally, monitor web application logs for suspicious requests containing unusual or encoded input in the 'righe' parameter. Consider deploying Web Application Firewalls (WAFs) with rules targeting reflected XSS payloads specific to OpenSTAManager. Regular security assessments and code reviews should be conducted to identify and remediate similar input validation issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-22T18:19:49.174Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a75aa5d1a09e29cb7e0992

Added to database: 3/3/2026, 10:03:17 PM

Last enriched: 3/3/2026, 10:17:33 PM

Last updated: 3/4/2026, 8:12:11 AM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses