PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-35013 openises CVE debrief

CVE-2026-35013 is a reflected cross-site scripting issue in Open ISES Tickets before version 3.44.2. The problem is described as unsanitized thelat and thelng GET parameters being inserted directly into JavaScript variable assignments in street_view.php, which can let a crafted link execute attacker-controlled script in a victim’s browser when the URL is visited. The supplied data identifies CWE-79 and a fixed release at v3.44.2.

Vendor
openises
Product
tickets
CVSS
MEDIUM 5.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-20
Original CVE updated
2026-05-21
Advisory published
2026-05-20
Advisory updated
2026-05-21

Who should care

Administrators and maintainers of Open ISES Tickets deployments, especially any instance exposing street_view.php to users. Security teams should prioritize systems running versions earlier than 3.44.2 and any workflows where users may click or open application links.

Technical summary

According to the supplied NVD record and referenced disclosure, street_view.php in Open ISES Tickets accepts thelat and thelng GET parameters and places their values into JavaScript without proper sanitization or escaping. That creates a reflected XSS condition: an attacker can supply a crafted URL so the malicious payload is rendered in the response and executes in the browser of a user who follows the link. The affected range is stated as versions before 3.44.2.

Defensive priority

Medium. The issue requires a user to open a crafted URL, but it still enables script execution in the web application’s origin, so exposed deployments should be updated promptly to the fixed version.

Recommended defensive actions

  • Upgrade Open ISES Tickets to version 3.44.2 or later.
  • Review street_view.php and related code paths for unsafe interpolation of request parameters into JavaScript.
  • Apply context-appropriate output encoding or server-side validation for thelat and thelng values.
  • Check for any exposed links or workflows that may allow users to reach the vulnerable page.
  • Use security testing to verify that reflected input is no longer executable after patching.

Evidence notes

The description and weakness mapping in the supplied source item identify reflected XSS in street_view.php, affected versions before 3.44.2, and CWE-79. The reference set includes a Git commit, the v3.44.2 release tag, and a Vulncheck advisory URL, but the full advisory content was not provided in the corpus.

Official resources

CVE record published and last modified on 2026-05-20T20:16:38.640Z. No KEV entry or ransomware-campaign indicator is present in the supplied data.