The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Oct 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 03 Oct 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0. | |
Title | OpenSupports 4.11.0 — SQL Injection | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Fluid Attacks
Published:
Updated: 2025-10-03T20:44:15.175Z
Reserved: 2025-09-18T14:57:59.906Z
Link: CVE-2025-10692

Updated: 2025-10-03T20:44:07.357Z

Status : Received
Published: 2025-10-03T21:15:32.373
Modified: 2025-10-03T21:15:32.373
Link: CVE-2025-10692

No data.

No data.