Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27012: CWE-306: Missing Authentication for Critical Function in devcode-it openstamanager

0
Critical
VulnerabilityCVE-2026-27012cvecve-2026-27012cwe-306
Published: Tue Mar 03 2026 (03/03/2026, 21:53:01 UTC)
Source: CVE Database V5
Vendor/Project: devcode-it
Product: openstamanager

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (idgruppo) by directly calling modules/utenti/actions.php. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 20:10:17 UTC

Technical Analysis

OpenSTAManager is an open-source management software widely used for technical assistance and invoicing. Versions 2.9.8 and earlier contain a critical vulnerability identified as CVE-2026-27012, categorized under CWE-306 (Missing Authentication for Critical Function). The vulnerability arises because the application fails to enforce authentication checks on a critical function located in modules/utenti/actions.php, which handles user group modifications. An attacker can exploit this by directly calling this PHP module remotely without any authentication or user interaction, allowing arbitrary changes to the 'idgruppo' parameter. This parameter controls the user's group membership, enabling privilege escalation from a standard user (e.g., agent) to the Amministratori group, effectively granting administrative rights. Conversely, attackers can also demote existing administrators, disrupting administrative control. The vulnerability impacts confidentiality, integrity, and availability, as unauthorized administrative access can lead to data breaches, unauthorized modifications, and denial of service. The CVSS v3.1 score is 9.8, reflecting the ease of exploitation (network vector, no privileges or user interaction required) and the critical impact on all security properties. No patches or official fixes are currently linked, and no known exploits have been reported in the wild, but the risk remains high due to the nature of the vulnerability and the software's role in managing sensitive business operations.

Potential Impact

The impact of CVE-2026-27012 is severe for organizations using OpenSTAManager, especially those relying on it for invoicing and technical assistance management. Successful exploitation allows attackers to gain administrative privileges without authentication, leading to full system compromise. This can result in unauthorized access to sensitive customer and financial data, manipulation or deletion of records, disruption of business operations, and potential compliance violations. The ability to demote legitimate administrators further complicates incident response and recovery efforts. Organizations may face financial losses, reputational damage, and regulatory penalties. Given the software’s role in managing invoicing and assistance workflows, critical business functions could be halted or manipulated, impacting service delivery and customer trust. The vulnerability’s network accessibility and lack of required user interaction increase the likelihood of exploitation, making it a significant threat to any deployment of affected versions worldwide.

Mitigation Recommendations

To mitigate CVE-2026-27012, organizations should immediately upgrade OpenSTAManager to a version beyond 2.9.8 once an official patch is released. Until then, implement strict network-level access controls to restrict access to the modules/utenti/actions.php endpoint, such as IP whitelisting or VPN-only access. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized requests attempting to modify user groups. Conduct thorough audits of user group memberships to identify unauthorized privilege escalations and restore legitimate configurations. Enforce strong authentication and authorization mechanisms at the application level, including multi-factor authentication for administrative accounts. Monitor logs for suspicious activity related to user group changes. If possible, isolate the OpenSTAManager instance from public networks or limit its exposure. Additionally, consider deploying intrusion detection systems (IDS) to alert on anomalous access patterns targeting this vulnerability. Finally, educate administrators and users about the risk and ensure incident response plans include steps for this specific threat.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.489Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a79342d1a09e29cbc204f2

Added to database: 3/4/2026, 2:04:50 AM

Last enriched: 3/11/2026, 8:10:17 PM

Last updated: 4/17/2026, 11:58:43 PM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses