OpenSTAManager has a Time-Based Blind SQL Injection with Amplified Denial of Service
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contain a critical Time-Based Blind SQL Injection vulnerability in the global search functionality. The application fails to properly sanitize the term parameter before using it in SQL LIKE clauses across multiple module-specific search handlers, allowing attackers to inject arbitrary SQL commands and extract sensitive data through time-based Boolean inference.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenSTAManager v2.9.8 and earlier have a critical time-based blind SQL injection in global search, allowing authenticated attackers to extract sensitive data.
Vulnerability
Overview
OpenSTAManager v2.9.8 and earlier contain a critical Time-Based Blind SQL Injection vulnerability in the global search functionality. The application fails to properly sanitize the term parameter before using it in SQL LIKE clauses across multiple module-specific search handlers. The entry point is /ajax_search.php, where the $term parameter undergoes only minimal sanitization (forward slash replacement) before being passed to all module-specific search handlers via /src/AJAX.php::search() [1][2][3].
Exploitation
Details
An authenticated attacker can exploit this vulnerability by sending a crafted term parameter in a GET request to /ajax_search.php. The unsanitized $term is then distributed to over 10 module-specific search handlers (including Articoli, Ordini, DDT, Fatture, Preventivi, Anagrafiche, Impianti, Contratti, Automezzi, Interventi) where it is directly concatenated into SQL LIKE clauses without prepared statements. For example, in /modules/articoli/ajax/search.php at line 51, the code builds a query with LIKE "%$term%" allowing arbitrary SQL injection [3]. The attacker can use time-based Boolean inference to extract data by observing response delays.
Impact
Successful exploitation allows an attacker to extract sensitive database contents including password hashes, customer data, and financial records. The vulnerability is amplified by the fact that the injection executes across 10+ modules, increasing the potential for data extraction and enabling a denial-of-service condition through prolonged time-based queries [3].
Mitigation
As of the publication date, no patch has been released. The vendor has confirmed the vulnerability and tested it on a live instance of v2.9.8. Users should monitor the official repository for updates and consider applying input sanitization or using parameterized queries as a workaround [1][3].
- GitHub - devcode-it/openstamanager: OpenSTAManager è un software gestionale open-source basato su web, sviluppato in PHP con database MySQL. Serve a gestire l'assistenza tecnica e la fatturazione elettronica per piccole e medie imprese. Include moduli per la contabilità, la gestione del magazzino, le anagrafiche di clienti e fornitori, i documenti di vendita e acquisto.
- NVD - CVE-2026-24417
- Time-Based Blind SQL Injection with Amplified Denial of Service
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
devcode-it/openstamanagerPackagist | >= 0 | — |
Affected products
1- devcode-it/openstamanagerv5Range: <= 2.9.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4hc4-8599-xh2hghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24417ghsaADVISORY
- github.com/devcode-it/openstamanager/security/advisories/GHSA-4hc4-8599-xh2hghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.