osTicket, SQL Injection, CVE-2025-26241 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-26241 is a SQL injection vulnerability in osTicket <=1.17.5, specifically in the “Search” function of tickets.php. Attackers can exploit this flaw by manipulating the `keywords` and `topic_id` parameters in HTTP requests. When combined maliciously, these inputs bypass input sanitization, allowing arbitrary SQL command execution. Since authentication is required, attackers must first gain valid credentials. Successful exploitation leads to database manipulation, data theft, or server compromise.

DailyCVE Form

Platform: osTicket
Version: <=1.17.5
Vulnerability: SQL Injection
Severity: Critical
Date: 06/13/2025

Prediction: Patch by 07/20/2025

What Undercode Say

-- Example malicious payload
keywords=test' UNION SELECT username,password FROM staff LIMIT 1--&topic_id=1
Check vulnerable version
curl -I "http://target/osticket/tickets.php" | grep "X-Powered-By: osTicket"

How Exploit

1. Authenticate as low-privilege user.

2. Craft malicious search query with SQL payload.

3. Extract/admin credentials via UNION-based injection.

Protection from this CVE

  • Update to osTicket >1.17.5
  • Input sanitization
  • WAF rules

Impact

  • Full database compromise
  • Privilege escalation
  • Remote code execution

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top