| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-3gw8-3mg3-jmpc | OpenSTAManager has a Time-Based Blind SQL Injection via `options[stato]` Parameter |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devcode
Devcode openstamanager |
|
| Vendors & Products |
Devcode
Devcode openstamanager |
|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, multiple AJAX select handlers in OpenSTAManager are vulnerable to Time-Based Blind SQL Injection through the options[stato] GET parameter. The user-supplied value is read from $superselect['stato'] and concatenated directly into SQL WHERE clauses as a bare expression, without any sanitization, parameterization, or allowlist validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database, including usernames, password hashes, financial records, and any other information stored in the MySQL database. This issue has been patched in version 2.10.2. | |
| Title | OpenSTAManager: Time-Based Blind SQL Injection via `options[stato]` Parameter | |
| Weaknesses | CWE-89 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-02T18:31:08.958Z
Reserved: 2026-03-03T14:25:19.246Z
Link: CVE-2026-28805
Updated: 2026-04-02T18:31:04.161Z
Status : Received
Published: 2026-04-02T14:16:26.400
Modified: 2026-04-02T14:16:26.400
Link: CVE-2026-28805
No data.
OpenCVE Enrichment
Updated: 2026-04-02T20:21:11Z
Github GHSA