VYPR
High severityNVD Advisory· Published Feb 4, 2026· Updated Feb 4, 2026

OpenSTAManager has a SQL Injection in ajax_complete.php (get_sedi endpoint)

CVE-2025-69213

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. In version 2.9.8 and prior, a SQL Injection vulnerability exists in the ajax_complete.php endpoint when handling the get_sedi operation. An authenticated attacker can inject malicious SQL code through the idanagrafica parameter, leading to unauthorized database access. At time of publication, no known patch exists.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OpenSTAManager ≤2.9.8 includes an authenticated SQL injection in ajax_complete.php via the idanagrafica parameter, allowing unauthorized database access.

Vulnerability

Overview

A SQL injection vulnerability exists in the ajax_complete.php endpoint of OpenSTAManager (version 2.9.8 and prior) during the get_sedi operation [1][2]. The root cause is the direct concatenation of the idanagrafica parameter from $_GET into a SQL query without sanitization or parameterization [3]. The vulnerable code at modules/anagrafiche/ajax/complete.php:28 builds the query as: $q = "SELECT id, CONCAT_WS( ' - ', nomesede, citta ) AS descrizione FROM an_sedi WHERE idanagrafica='".$idanagrafica."' ..." and then executes it via $dbo->fetchArray($q) [3].

Exploitation

Prerequisites

The attacker must be authenticated to the application, as the endpoint requires a valid session [2][3]. No other network-level prerequisites are needed beyond web access to the vulnerable instance. The idanagrafica parameter is user-supplied via GET request, making exploitation straightforward. A proof-of-concept demonstrates time-based blind SQL injection using a SLEEP(5) payload, and tools like sqlmap can automate extraction [3].

Impact

Successful exploitation can lead to complete database exfiltration, including user credentials, customer data, and financial records [3]. The attacker may also modify the zz_users table to escalate privileges to administrator level, or alter or delete any record in the database. Under certain configurations, there is potential for remote code execution via SELECT ... INTO OUTFILE if file write permissions are enabled [3].

Mitigation

Status

At the time of publication (February 2026), no official patch or fix is available for this vulnerability [2]. The project maintainers have not released a patched version, and all branches up to version 2.9.8 remain affected [3]. Users should monitor the vendor repository for updates and apply strict input validation or a web application firewall rule to block SQL injection patterns on the ajax_complete.php endpoint.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
devcode-it/openstamanagerPackagist
<= 2.9.8

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.