Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2547: Cross Site Scripting in LigeroSmart

0
Medium
VulnerabilityCVE-2026-2547cvecve-2026-2547
Published: Mon Feb 16 2026 (02/16/2026, 08:32:07 UTC)
Source: CVE Database V5
Product: LigeroSmart

Description

A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function AgentDashboard of the file /otrs/index.pl. Performing a manipulation of the argument Subaction results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

AILast updated: 02/16/2026, 09:03:31 UTC

Technical Analysis

CVE-2026-2547 identifies a cross-site scripting vulnerability in LigeroSmart, a helpdesk and ticketing software widely used for IT service management. The vulnerability resides in the AgentDashboard function of the /otrs/index.pl script, specifically through improper sanitization of the Subaction parameter. An attacker can craft a malicious URL or payload that, when processed by the vulnerable function, injects arbitrary JavaScript code into the web interface. This XSS flaw is remotely exploitable without requiring authentication, though it does require user interaction such as clicking a malicious link. The vulnerability has a CVSS 4.0 base score of 5.1, reflecting medium severity due to the ease of exploitation and limited impact scope. The exploit code has been publicly disclosed, increasing the risk of opportunistic attacks. LigeroSmart versions from 6.1.0 through 6.1.26 are affected, and as of the publication date, no official patch or mitigation has been released by the vendor. The vulnerability could allow attackers to hijack user sessions, steal credentials, or perform actions on behalf of legitimate users, undermining confidentiality and integrity of the affected systems. The lack of vendor response and public exploit availability heighten the urgency for organizations to implement interim mitigations.

Potential Impact

For European organizations, the impact of this XSS vulnerability can be significant, especially for entities relying on LigeroSmart for internal IT service management or customer support portals. Successful exploitation could lead to session hijacking, unauthorized access to sensitive ticketing data, and potential lateral movement within internal networks. Confidential information such as user credentials, internal communications, and support tickets could be exposed or manipulated. This may result in operational disruptions, data breaches, and reputational damage. Additionally, attackers could use the vulnerability as a foothold to deploy further attacks or malware. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to strict data protection requirements under GDPR. The medium severity rating indicates that while the vulnerability is not critical, it still poses a tangible risk that should be addressed promptly to prevent exploitation.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement specific mitigations: 1) Employ web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the Subaction parameter. 2) Restrict access to the AgentDashboard interface to trusted networks or VPNs to reduce exposure. 3) Implement strict Content Security Policy (CSP) headers to limit the execution of injected scripts. 4) Conduct input validation and sanitization on the server side if possible, or deploy reverse proxies that can filter malicious inputs. 5) Educate users about the risks of clicking untrusted links and encourage cautious behavior. 6) Monitor logs for unusual activity related to the Subaction parameter or AgentDashboard access. 7) Plan for rapid deployment of vendor patches once released. 8) Consider temporary disabling or limiting functionality of the vulnerable component if feasible. These targeted actions go beyond generic advice and address the specific attack vector and environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-15T16:00:31.690Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6992da08bda29fb02f5c0246

Added to database: 2/16/2026, 8:49:12 AM

Last enriched: 2/16/2026, 9:03:31 AM

Last updated: 2/21/2026, 12:20:18 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats