VYPR
High severityNVD Advisory· Published Oct 3, 2025· Updated Apr 15, 2026

CVE-2025-10692

CVE-2025-10692

Description

The endpoint POST /api/staff/get-new-tickets concatenates the user-controlled parameter departmentId directly into the SQL WHERE clause without parameter binding. As a result, an authenticated staff user (level ≥ 1) can inject SQL to alter the filter logic, effectively bypassing department scoping and disclosing tickets beyond their intended access.This issue affects OpenSupports: 4.11.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Authenticated staff users can exploit SQL injection in the departmentId parameter to bypass department scoping and view tickets from all departments.

Vulnerability

Overview

The endpoint POST /api/staff/get-new-tickets in OpenSupports 4.11.0 is vulnerable to SQL injection. The user-controlled parameter departmentId is concatenated directly into the SQL WHERE clause without parameter binding [2]. This allows an authenticated staff user (level ≥ 1) to inject SQL statements that alter the filter logic.

Exploitation

An attacker must be authenticated as a staff user with level 1 or higher. By sending a crafted departmentId parameter containing SQL tautologies (e.g., 1 OR 1=1), the attacker can bypass the intended department scoping [2]. The injection occurs in the backend file server/controllers/staff/get-new-tickets.php, which lacks the secure parameterized query pattern used elsewhere in the application [2].

Impact

Successful exploitation enables a low-privileged staff user to list "new tickets" across all departments, gaining unauthorized access to ticket titles, content excerpts, and metadata [2]. This constitutes a confidentiality breach and an escalation of scope beyond the user's authorized department filter.

Mitigation

As of the advisory publication, no patch is available for this vulnerability [2]. The vendor recommends applying input validation and using parameterized queries to prevent SQL injection. The vulnerability has been assigned CVE-2025-10692 and was discovered by Cristian Vargas from Fluid Attacks' Offensive Team [2].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.