PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-48216 Open ISES CVE debrief

CVE-2026-48216 is a reflected cross-site scripting issue reported in Open ISES Tickets before version 3.44.2. The issue is described as unsanitized POST parameters being inserted into HTML input value attributes in db_loader.php, allowing attacker-controlled JavaScript to run in a victim’s browser when the response is rendered. The published fix is associated with the v3.44.2 release and a linked repository commit.

Vendor
Open ISES
Product
Tickets
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-21
Original CVE updated
2026-05-21
Advisory published
2026-05-21
Advisory updated
2026-05-21

Who should care

Administrators and developers running Open ISES Tickets instances prior to 3.44.2 should care most, especially if the db_loader.php endpoint is reachable by authenticated users. Security teams should also review any workflows that render user-supplied form values back into HTML attributes.

Technical summary

The supplied description says db_loader.php reflects multiple POST parameters (ticketshost, ticketsdb, ticketsuser, ticketspassword, ticketsprefix, db_schema) into HTML form input value attributes without proper sanitization, creating a reflected XSS condition (CWE-79). The available references point to a fixing commit and the v3.44.2 release tag. NVD metadata in the supplied corpus marks the record as Deferred.

Defensive priority

Medium. This is a browser-side injection issue that can expose user sessions or trigger unintended actions in the affected web application, but the supplied sources do not indicate KEV status or known ransomware use.

Recommended defensive actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later.
  • Review db_loader.php and related templates to ensure all reflected values are properly HTML-attribute encoded.
  • Validate that any user-controlled POST parameters are treated as untrusted before rendering in responses.
  • If the endpoint is exposed to authenticated users, confirm authorization boundaries and limit access to only necessary roles.
  • Use the linked fix commit and release tag to verify that your deployed version includes the remediation.

Evidence notes

Source material includes the CVE description, an NVD record published and modified on 2026-05-21, and references to a fixing commit, the v3.44.2 release tag, and a Vulncheck advisory. The supplied record identifies CWE-79. Vendor attribution in the provided data is low-confidence/needs review, so this debrief uses the product name stated in the CVE description rather than asserting broader vendor details.

Official resources

CVE published on 2026-05-21 and last modified on 2026-05-21. The supplied sources reference a fix commit and the v3.44.2 release, indicating the vulnerability was disclosed alongside remediation on the same date.