Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24416: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in devcode-it openstamanager

0
High
VulnerabilityCVE-2026-24416cvecve-2026-24416cwe-89
Published: Fri Feb 06 2026 (02/06/2026, 18:08:44 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contain a critical Time-Based Blind SQL Injection vulnerability in the article pricing completion handler. The application fails to properly sanitize the idarticolo parameter before using it in SQL queries, allowing attackers to inject arbitrary SQL commands and extract sensitive data through time-based Boolean inference.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 12:08:49 UTC

Technical Analysis

CVE-2026-24416 is a high-severity SQL Injection vulnerability identified in OpenSTAManager, an open-source management software widely used for technical assistance and invoicing. The vulnerability exists in versions 2.9.8 and earlier, specifically within the article pricing completion handler, where the 'idarticolo' parameter is not properly sanitized before being incorporated into SQL queries. This improper neutralization of special elements (CWE-89) allows attackers to inject arbitrary SQL commands. The exploitation technique is time-based blind SQL injection, which leverages time delays in database responses to infer data values without direct output, making detection more difficult. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates network attack vector, low attack complexity, no user interaction, and requires low privileges but results in high impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the vulnerability poses a significant risk due to the sensitive nature of invoicing and management data handled by OpenSTAManager. The lack of patches at the time of reporting necessitates immediate attention to input validation and access controls to mitigate potential exploitation.

Potential Impact

For European organizations, the impact of this vulnerability can be severe. Exploitation could lead to unauthorized disclosure of sensitive business data, including pricing, client information, and invoicing records, potentially resulting in financial loss, reputational damage, and regulatory non-compliance under GDPR. Integrity of data could also be compromised, allowing attackers to alter pricing or invoicing details, which could disrupt business operations and financial reporting. Availability might be affected if attackers leverage the vulnerability to execute denial-of-service attacks via resource exhaustion or database locking. Given the criticality of invoicing and management systems in SMEs and technical service providers, exploitation could disrupt supply chains and customer relations. The network-exploitable nature means attackers can target exposed instances remotely, increasing the threat surface for European companies using OpenSTAManager.

Mitigation Recommendations

1. Immediate implementation of strict input validation and sanitization for the 'idarticolo' parameter and all user-supplied inputs to prevent injection of malicious SQL code. 2. Employ parameterized queries or prepared statements in the application code to eliminate direct concatenation of user inputs into SQL commands. 3. Restrict database user privileges to the minimum necessary, avoiding elevated permissions that could exacerbate the impact of an injection attack. 4. Monitor and audit database queries and application logs for unusual delays or patterns indicative of time-based blind SQL injection attempts. 5. Isolate OpenSTAManager instances behind firewalls and limit network exposure to trusted IPs where possible. 6. Engage with the vendor or community to obtain and apply patches or updates as soon as they become available. 7. Conduct regular security assessments and penetration testing focusing on injection vulnerabilities. 8. Educate developers and administrators on secure coding practices and the risks of SQL injection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-22T18:19:49.174Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69863332f9fa50a62f2637a7

Added to database: 2/6/2026, 6:30:10 PM

Last enriched: 2/14/2026, 12:08:49 PM

Last updated: 3/21/2026, 6:58:36 PM

Views: 63

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses