Home

Description

GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the ticket subject field that allows authenticated staff members to inject malicious JavaScript by manipulating the editsubject POST parameter. Attackers can inject XSS payloads through inadequate sanitization in Controller_Ticket.EditSubmit() that bypass the incomplete SanitizeForXSS() method to execute arbitrary JavaScript when other staff members or administrators view the affected ticket.

PUBLISHED Reserved 2026-01-15 | Published 2026-04-20 | Updated 2026-04-20 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N

MEDIUM: 6.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:H/SI:H/SA:H

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

Default status
unaffected

Any version before 4.99.9
affected

Credits

Alex Williams from Pellera Technologies finder

VulnCheck coordinator

References

gfi.ai/...ging-solutions/helpdesk/resources/product-releases vendor-advisory patch

www.vulncheck.com/...sk-stored-xss-via-editsubject-parameter third-party-advisory

cve.org (CVE-2026-23758)

nvd.nist.gov (CVE-2026-23758)

Download JSON