CVE-2026-48213 — Add.Php That Cross-Site Scripting (XSS)
CVE-2026-48213 — Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in add.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id POST parameter directly into an HTML form input value attribute
What This Means For You
- If your environment is affected by CWE-79, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-48213 updates and patches.
Related ATT&CK Techniques
🛡️ Detection Rules
2 rules · 6 SIEM formats2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
CVE-2026-48213 - Reflected XSS in Open ISES Tickets add.php
title: CVE-2026-48213 - Reflected XSS in Open ISES Tickets add.php
id: scw-2026-05-21-ai-1
status: experimental
level: medium
description: |
Detects a reflected Cross-Site Scripting (XSS) vulnerability in Open ISES Tickets version prior to 3.44.2. This rule specifically targets the add.php script and the 'ticket_id' POST parameter, which is known to be unsanitized. Attackers can inject JavaScript payloads that execute in the victim's browser when the response is rendered. This rule looks for the specific URI path and parameter, along with common XSS payload indicators within the request.
author: SCW Feed Engine (AI-generated)
date: 2026-05-21
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-48213/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri:
- '/add.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'ticket_id='
# The actual payload would be injected into the ticket_id parameter,
# so we look for common XSS patterns within the POST data (represented by cs-uri-query here for simplicity,
# assuming the webserver logs this parameter in the query string or POST body).
# A more robust rule might require inspecting POST body content if available.
# Example payload indicators:
cs-uri-query|contains:
- '<script>alert('
- 'onerror=alert('
- 'javascript:alert('
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-48213 | vulnerability | CVE-2026-48213 |
| CWE-79 | weakness | CWE-79 |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 21, 2026 at 20:16 UTC |
This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.
Believe this infringes your rights? Submit a takedown request.