Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5g9-mqjj-pxcc

Опубликовано: 03 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 7.1

Описание

The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.

The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.

EPSS

Процентиль: 26%
0.0009
Низкий

7.1 High

CVSS4

Дефекты

CWE-89

Связанные уязвимости

nvd
4 месяца назад

The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.

EPSS

Процентиль: 26%
0.0009
Низкий

7.1 High

CVSS4

Дефекты

CWE-89