CVE-2026-29782: CWE-502: Deserialization of Untrusted Data in devcode-it openstamanager
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2.
AI Analysis
Technical Summary
CVE-2026-29782 is a deserialization of untrusted data vulnerability (CWE-502) found in OpenSTAManager, an open-source technical assistance and invoicing management software. The vulnerability exists in the oauth2.php file prior to version 2.10.2, which exposes an unauthenticated endpoint with $skip_permissions set to true. This endpoint accepts a GET parameter named 'state' that is used to load a record from the zz_oauth2 database table. During the OAuth2 configuration flow, the application calls PHP's unserialize() function on the access_token field of this record without any class restrictions or validation. Because the data is attacker-controlled and unserialized without safeguards, this can lead to remote code execution (RCE) or other malicious object injection attacks. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires some privileges to control the 'state' parameter, the endpoint itself is unauthenticated, increasing risk. The vulnerability has been patched in OpenSTAManager version 2.10.2. No known exploits in the wild have been reported to date.
Potential Impact
Successful exploitation of this vulnerability can lead to full compromise of the affected OpenSTAManager instance. Attackers can execute arbitrary code remotely, potentially gaining control over the server hosting the application. This threatens the confidentiality of sensitive invoicing and technical assistance data, compromises data integrity by allowing unauthorized modifications, and impacts availability through potential denial-of-service conditions or system instability. Organizations relying on OpenSTAManager for business-critical operations face risks of data breaches, financial fraud, and operational disruption. Given the unauthenticated nature of the vulnerable endpoint, attackers can attempt exploitation remotely over the network, increasing the attack surface. The requirement for some privilege to influence the 'state' parameter somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or insider threats.
Mitigation Recommendations
The primary mitigation is to upgrade OpenSTAManager to version 2.10.2 or later, where the vulnerability has been patched. Until upgrade is possible, organizations should restrict access to the oauth2.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Additionally, review and harden OAuth2 configuration flows to ensure that untrusted input is never passed directly to unserialize() or similar unsafe functions. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious deserialization attempts. Conduct thorough code audits to identify and refactor any other uses of unserialize() without class restrictions. Monitor logs for suspicious activity related to the 'state' parameter or OAuth2 endpoints. Finally, implement strong privilege separation and minimize permissions to reduce the ability of attackers to manipulate parameters used in deserialization.
Affected Countries
United States, Germany, France, United Kingdom, Canada, Australia, Netherlands, Italy, Spain, Brazil
CVE-2026-29782: CWE-502: Deserialization of Untrusted Data in devcode-it openstamanager
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-29782 is a deserialization of untrusted data vulnerability (CWE-502) found in OpenSTAManager, an open-source technical assistance and invoicing management software. The vulnerability exists in the oauth2.php file prior to version 2.10.2, which exposes an unauthenticated endpoint with $skip_permissions set to true. This endpoint accepts a GET parameter named 'state' that is used to load a record from the zz_oauth2 database table. During the OAuth2 configuration flow, the application calls PHP's unserialize() function on the access_token field of this record without any class restrictions or validation. Because the data is attacker-controlled and unserialized without safeguards, this can lead to remote code execution (RCE) or other malicious object injection attacks. The CVSS v3.1 score is 7.2 (high), reflecting network attack vector, low attack complexity, required privileges, no user interaction, and high impact on confidentiality, integrity, and availability. Although exploitation requires some privileges to control the 'state' parameter, the endpoint itself is unauthenticated, increasing risk. The vulnerability has been patched in OpenSTAManager version 2.10.2. No known exploits in the wild have been reported to date.
Potential Impact
Successful exploitation of this vulnerability can lead to full compromise of the affected OpenSTAManager instance. Attackers can execute arbitrary code remotely, potentially gaining control over the server hosting the application. This threatens the confidentiality of sensitive invoicing and technical assistance data, compromises data integrity by allowing unauthorized modifications, and impacts availability through potential denial-of-service conditions or system instability. Organizations relying on OpenSTAManager for business-critical operations face risks of data breaches, financial fraud, and operational disruption. Given the unauthenticated nature of the vulnerable endpoint, attackers can attempt exploitation remotely over the network, increasing the attack surface. The requirement for some privilege to influence the 'state' parameter somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or insider threats.
Mitigation Recommendations
The primary mitigation is to upgrade OpenSTAManager to version 2.10.2 or later, where the vulnerability has been patched. Until upgrade is possible, organizations should restrict access to the oauth2.php endpoint by implementing network-level controls such as IP whitelisting or VPN-only access. Additionally, review and harden OAuth2 configuration flows to ensure that untrusted input is never passed directly to unserialize() or similar unsafe functions. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block malicious deserialization attempts. Conduct thorough code audits to identify and refactor any other uses of unserialize() without class restrictions. Monitor logs for suspicious activity related to the 'state' parameter or OAuth2 endpoints. Finally, implement strong privilege separation and minimize permissions to reduce the ability of attackers to manipulate parameters used in deserialization.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-04T16:26:02.898Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69ce7bd9e6bfc5ba1ddfe6c7
Added to database: 4/2/2026, 2:23:21 PM
Last enriched: 4/2/2026, 2:40:15 PM
Last updated: 4/3/2026, 5:56:04 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.