CVE-2026-48213 — Add.Php That Cross-Site Scripting (XSS)

CVE-2026-48213 — Add.Php That Cross-Site Scripting (XSS)

CVE-2026-48213 — Open ISES Tickets before 3.44.2 contains a reflected cross-site scripting vulnerability in add.php that allows authenticated attackers to inject arbitrary JavaScript by passing an unsanitized value through the ticket_id POST parameter directly into an HTML form input value attribute

What This Means For You

  • If your environment is affected by CWE-79, review your exposure and prioritize patching based on your environment. Monitor vendor advisories for CVE-2026-48213 updates and patches.

Related ATT&CK Techniques

🛡️ Detection Rules

2 rules · 6 SIEM formats

2 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

medium T1190 Initial Access

CVE-2026-48213 - Reflected XSS in Open ISES Tickets add.php

Sigma YAML — free preview
title: CVE-2026-48213 - Reflected XSS in Open ISES Tickets add.php
id: scw-2026-05-21-ai-1
status: experimental
level: medium
description: |
  Detects a reflected Cross-Site Scripting (XSS) vulnerability in Open ISES Tickets version prior to 3.44.2. This rule specifically targets the add.php script and the 'ticket_id' POST parameter, which is known to be unsanitized. Attackers can inject JavaScript payloads that execute in the victim's browser when the response is rendered. This rule looks for the specific URI path and parameter, along with common XSS payload indicators within the request.
author: SCW Feed Engine (AI-generated)
date: 2026-05-21
references:
  - https://shimiscyberworld.com/posts/nvd-CVE-2026-48213/
tags:
  - attack.initial_access
  - attack.t1190
logsource:
    category: webserver
detection:
  selection:
      cs-uri: 
          - '/add.php'
      cs-method: 
          - 'POST'
      cs-uri-query|contains:
          - 'ticket_id='
      # The actual payload would be injected into the ticket_id parameter, 
      # so we look for common XSS patterns within the POST data (represented by cs-uri-query here for simplicity, 
      # assuming the webserver logs this parameter in the query string or POST body). 
      # A more robust rule might require inspecting POST body content if available.
      # Example payload indicators:
      cs-uri-query|contains:
          - '<script>alert(' 
          - 'onerror=alert(' 
          - 'javascript:alert(' 
      condition: selection
falsepositives:
  - Legitimate administrative activity

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
CVE-2026-48213 vulnerability CVE-2026-48213
CWE-79 weakness CWE-79
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedMay 21, 2026 at 20:16 UTC

This content was curated and summarized by Shimi's Cyber World for informational purposes. It is not copied or republished in full. All intellectual property rights remain with the original author and source.

Believe this infringes your rights? Submit a takedown request.

Related coverage

ConnectWise Automate Agent Fails Plugin Verification, CVSS 8.8

CVE-2026-9089 — The ConnectWise Automate™ Agent does not fully verify the authenticity of components obtained during plugin loading and self-update operations. This issue is addressed...

vulnerabilityCVEhigh-severitycwe-494
/SCW Vulnerability Desk /HIGH /8.8 /⚑ 3 IOCs /⚙ 3 Sigma

CVE-2026-39531: WP Directory Kit Blind SQL Injection Flaw Rated Critical

CVE-2026-39531 — Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Wp Directory Kit WP Directory Kit allows Blind SQL...

vulnerabilityCVEcriticalhigh-severitysql-injectioncwe-89
/SCW Vulnerability Desk /CRITICAL /9.3 /⚑ 4 IOCs

CVE-2026-1816 — Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile Vulnerability

CVE-2026-1816 — Improper restriction of excessive authentication attempts vulnerability in Turkiye Electricity Transmission Corporation (TEİAŞ) Mobile Application allows Brute Force. This issue affects Mobile Application:...

vulnerabilityCVEmedium-severitycwe-307
/SCW Vulnerability Desk /MEDIUM /6.3 /⚑ 2 IOCs /⚙ 1 Sigma