Home

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received via $_GET['righe'] is directly concatenated into an SQL query without any sanitization, parameterization or validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database, including user credentials, customer information, invoice data and any other stored data. This vulnerability is fixed in 2.10.2.

PUBLISHED Reserved 2026-04-02 | Published 2026-04-06 | Updated 2026-04-07 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

< 2.10.2
affected

References

github.com/...anager/security/advisories/GHSA-mmm5-3g4x-qw39 exploit

github.com/...anager/security/advisories/GHSA-mmm5-3g4x-qw39

github.com/devcode-it/openstamanager/releases/tag/v2.10.2

cve.org (CVE-2026-35470)

nvd.nist.gov (CVE-2026-35470)

Download JSON