OpenSTAManager has a SQL Injection in ajax_complete.php (get_sedi endpoint)
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. In version 2.9.8 and prior, a SQL Injection vulnerability exists in the ajax_complete.php endpoint when handling the get_sedi operation. An authenticated attacker can inject malicious SQL code through the idanagrafica parameter, leading to unauthorized database access. At time of publication, no known patch exists.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenSTAManager ≤2.9.8 includes an authenticated SQL injection in ajax_complete.php via the idanagrafica parameter, allowing unauthorized database access.
Vulnerability
Overview
A SQL injection vulnerability exists in the ajax_complete.php endpoint of OpenSTAManager (version 2.9.8 and prior) during the get_sedi operation [1][2]. The root cause is the direct concatenation of the idanagrafica parameter from $_GET into a SQL query without sanitization or parameterization [3]. The vulnerable code at modules/anagrafiche/ajax/complete.php:28 builds the query as: $q = "SELECT id, CONCAT_WS( ' - ', nomesede, citta ) AS descrizione FROM an_sedi WHERE idanagrafica='".$idanagrafica."' ..." and then executes it via $dbo->fetchArray($q) [3].
Exploitation
Prerequisites
The attacker must be authenticated to the application, as the endpoint requires a valid session [2][3]. No other network-level prerequisites are needed beyond web access to the vulnerable instance. The idanagrafica parameter is user-supplied via GET request, making exploitation straightforward. A proof-of-concept demonstrates time-based blind SQL injection using a SLEEP(5) payload, and tools like sqlmap can automate extraction [3].
Impact
Successful exploitation can lead to complete database exfiltration, including user credentials, customer data, and financial records [3]. The attacker may also modify the zz_users table to escalate privileges to administrator level, or alter or delete any record in the database. Under certain configurations, there is potential for remote code execution via SELECT ... INTO OUTFILE if file write permissions are enabled [3].
Mitigation
Status
At the time of publication (February 2026), no official patch or fix is available for this vulnerability [2]. The project maintainers have not released a patched version, and all branches up to version 2.9.8 remain affected [3]. Users should monitor the vendor repository for updates and apply strict input validation or a web application firewall rule to block SQL injection patterns on the ajax_complete.php endpoint.
- GitHub - devcode-it/openstamanager: OpenSTAManager è un software gestionale open-source basato su web, sviluppato in PHP con database MySQL. Serve a gestire l'assistenza tecnica e la fatturazione elettronica per piccole e medie imprese. Include moduli per la contabilità, la gestione del magazzino, le anagrafiche di clienti e fornitori, i documenti di vendita e acquisto.
- NVD - CVE-2025-69213
- SQL Injection in ajax_complete.php (get_sedi endpoint)
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
devcode-it/openstamanagerPackagist | <= 2.9.8 | — |
Affected products
2- Range: <=2.9.8
- devcode-it/openstamanagerv5Range: <= 2.9.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-w995-ff8h-rppgghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-69213ghsaADVISORY
- github.com/devcode-it/openstamanager/security/advisories/GHSA-w995-ff8h-rppgghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.