PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-48235 Open ISES CVE debrief

CVE-2026-48235 is a SQL injection flaw in Open ISES Tickets before version 3.44.2. The vulnerable code in incs/remotes.inc.php concatenates multiple fields parsed from external GPS tracking responses into SQL statements, creating a path for database manipulation if the remote tracker source is compromised or impersonated.

Vendor
Open ISES
Product
Tickets
CVSS
HIGH 8.8
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-21
Original CVE updated
2026-05-21
Advisory published
2026-05-21
Advisory updated
2026-05-21

Who should care

Administrators and maintainers of Open ISES Tickets deployments, especially environments that use external GPS tracking integrations such as InstaMapper or Google Latitude-style services.

Technical summary

According to the advisory and NVD record, incs/remotes.inc.php uses untrusted latitude, longitude, callsign, mph, altitude, and timestamp values from external GPS tracker XML/JSON responses directly in UPDATE and INSERT statements without sanitization. That pattern creates a CWE-89 SQL injection condition. Because the input originates from a remote tracking endpoint, an attacker who can compromise or impersonate that endpoint can inject SQL that affects responder location data, track records, and assignment-related tables. The NVD vector shows the issue is network-reachable with no privileges or user interaction required.

Defensive priority

High. The issue is network-exploitable and can directly affect database integrity for responder and tracking data.

Recommended defensive actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later.
  • Review the fixing commit and confirm the vulnerable SQL construction in incs/remotes.inc.php is removed.
  • Use parameterized queries and strict input validation for all externally supplied GPS tracker fields.
  • Audit integrations that ingest remote tracker responses and monitor for unexpected changes in location, track, or assignment records.

Evidence notes

This debrief is based on the NVD CVE record, the VulnCheck advisory, the fixing commit, and the v3.44.2 release tag. The source material identifies CWE-89 and describes the vulnerable code path in incs/remotes.inc.php as well as the fixed release version.

Official resources

Publicly disclosed on 2026-05-21 via VulnCheck and recorded by NVD the same day; the NVD record is marked Deferred at the time of this source snapshot.