PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-48236 Open ISES CVE debrief

Open ISES Tickets versions before 3.44.2 are affected by an authenticated SQL injection in db_loader.php. The issue stems from multiple POST parameters being concatenated into mysqli connection arguments and dynamic SQL without sanitization, which can let an attacker alter query behavior and impact database contents. The referenced 3.44.2 release and fixing commit indicate a patch is available.

Vendor
Open ISES
Product
Tickets
CVSS
HIGH 7.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-21
Original CVE updated
2026-05-21
Advisory published
2026-05-21
Advisory updated
2026-05-21

Who should care

Administrators, developers, and security teams responsible for Open ISES Tickets deployments, especially instances running versions earlier than 3.44.2 and any environment where authenticated users can reach database-loader functionality.

Technical summary

According to the CVE description, db_loader.php accepts POST parameters including ticketsdb, ticketshost, ticketsuser, and ticketspassword, then concatenates them into database-related operations without proper sanitization. Because the vulnerable flow is reachable by authenticated attackers, crafted input can change SQL semantics and affect the confidentiality and integrity of database contents. The supplied CVSS vector reflects network reachability with low-privilege authentication and high confidentiality impact.

Defensive priority

High priority: patch to 3.44.2 or later as soon as practical and restrict access to the affected workflow until remediation is complete.

Recommended defensive actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later.
  • Restrict access to any database-loader or setup workflow so only trusted administrators can reach it.
  • Review application and database logs for suspicious values in ticketsdb, ticketshost, ticketsuser, and ticketspassword, along with unexpected database activity.
  • Validate that the deployed fix matches the referenced commit and release, especially if you maintain local customizations.

Evidence notes

This debrief is based on the supplied CVE description and the referenced source items. The NVD record for CVE-2026-48236 cites a Vulncheck advisory, the openises/tickets fixing commit ecfeb406a016766cae81c749e14b5145a9f2dbff, and the v3.44.2 release tag. The source item metadata also marks the NVD vulnerability status as Deferred. Published and modified timestamps provided in the corpus are both 2026-05-21.

Official resources

Publicly disclosed on 2026-05-21. The supplied NVD record was published and modified the same day and references both the fixing commit and the v3.44.2 release.