Home

Description

GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the template group creation and editing functionality that allows authenticated administrators to inject arbitrary JavaScript by manipulating the companyname POST parameter without HTML sanitization. Attackers can inject malicious scripts through the companyname field that execute in the browsers of any administrator viewing the Templates > Groups page.

PUBLISHED Reserved 2026-01-15 | Published 2026-04-20 | Updated 2026-04-20 | Assigner VulnCheck




MEDIUM: 4.8CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version before 4.99.9
affected

Credits

Alex Williams from Pellera Technologies finder

VulnCheck coordinator

References

gfi.ai/...ging-solutions/helpdesk/resources/product-releases vendor-advisory patch

www.vulncheck.com/...sk-stored-xss-via-companyname-parameter third-party-advisory

cve.org (CVE-2026-23752)

nvd.nist.gov (CVE-2026-23752)

Download JSON