Open ISES Tickets SQL Injection Vulnerability (CVE-2026-48240)
Open ISES Tickets before version 3.44.2 is vulnerable to SQL injection in ajax/statistics.php via the tick_id and f_tick_id POST parameters, allowing authenticated attackers to manipulate SQL queries and potentially read, modify, or destroy database contents.
Open ISES Tickets before version 3.44.2 is susceptible to a SQL injection vulnerability (CVE-2026-48240) within the ajax/statistics.php script. The vulnerability stems from the improper sanitization of the tick_id and f_tick_id POST parameters. These parameters are directly concatenated into the WHERE clauses of SELECT statements used in statistics rollup queries. An authenticated attacker can exploit this flaw by crafting malicious requests that alter the query’s intended semantics, potentially enabling the unauthorized reading, modification, or deletion of sensitive data stored within the database. This issue was reported by VulnCheck and has a CVSS v3.1 base score of 7.1.
Attack Chain
- Attacker authenticates to the Open ISES Tickets application with valid credentials.
- Attacker crafts a malicious HTTP POST request targeting
ajax/statistics.php. - The POST request includes the
tick_idorf_tick_idparameter containing a SQL injection payload. - The application unsafely concatenates the attacker-controlled parameters into the SQL query’s WHERE clause.
- The malicious SQL query executes against the database, potentially altering data selection, modification, or deletion.
- The application returns a potentially modified or erroneous statistics rollup result based on the injected SQL.
- Attacker analyzes the response to refine and escalate the SQL injection attack.
- Attacker leverages the successful SQL injection to read sensitive database contents or perform unauthorized data manipulation, potentially compromising the entire application.
Impact
Successful exploitation of this SQL injection vulnerability (CVE-2026-48240) could allow an attacker to read sensitive information from the Open ISES Tickets database, potentially including user credentials, ticket details, and other confidential data. The attacker may also be able to modify or delete data, leading to data corruption or denial of service. Given the high CVSS score of 7.1, this vulnerability poses a significant risk to the confidentiality and integrity of the application and its data.
Recommendation
- Upgrade Open ISES Tickets to version 3.44.2 or later to patch CVE-2026-48240 (see References).
- Deploy the Sigma rules provided below to detect potential exploitation attempts targeting the vulnerable
ajax/statistics.phpendpoint. - Implement input validation and sanitization for the
tick_idandf_tick_idPOST parameters inajax/statistics.phpto prevent SQL injection attacks. - Review and restrict database access privileges for the Open ISES Tickets application to minimize the impact of successful SQL injection attacks.
Detection coverage 2
Detects CVE-2026-48240 Exploitation — Open ISES Tickets SQL Injection Attempt
highDetects CVE-2026-48240 exploitation attempt in Open ISES Tickets by identifying suspicious POST requests to ajax/statistics.php with SQL injection payloads in tick_id or f_tick_id parameters.
Detects CVE-2026-48240 Exploitation — Open ISES Tickets SQL Injection Error Responses
mediumDetects CVE-2026-48240 exploitation attempt in Open ISES Tickets based on web server error responses following a SQL injection attempt to ajax/statistics.php.
Detection queries are available on the platform. Get full rules →