OpenSTAManager has an SQL Injection vulnerability in the Scadenzario bulk operations module
Description
OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contain a critical Error-Based SQL Injection vulnerability in the bulk operations handler for the Scadenzario (Payment Schedule) module. The application fails to validate that elements of the id_records array are integers before using them in an SQL IN() clause, allowing attackers to inject arbitrary SQL commands and extract sensitive data through XPATH error messages.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
OpenSTAManager v2.9.8 and earlier contain a critical SQL injection in the Scadenzario module's bulk operations, allowing authenticated attackers to extract database contents via XPATH errors.
OpenSTAManager, an open-source management software for technical assistance and invoicing [1], is vulnerable to a critical error-based SQL injection in version 2.9.8 and earlier. The vulnerability resides in the bulk operations handler of the Scadenzario (Payment Schedule) module, where the application fails to validate that elements of the id_records POST array are integers before using them in an SQL IN() clause [2]. The array_clean() function only removes empty values and does not enforce type checking, allowing arbitrary SQL payloads to pass through [3].
Exploitation requires authentication and access to the /actions.php?id_module=18 endpoint, which processes bulk operations for the Scadenzario module [3]. An attacker can inject SQL commands via the id_records[] POST parameter, taking advantage of the fact that the vulnerable code directly concatenates array elements into the query string without parameterization or type validation [3].
The impact is severe: an attacker can leverage XPATH error messages to extract entire database contents, including user credentials, customer personally identifiable information (PII), and financial records [2][3]. This could lead to complete compromise of the application's data confidentiality and integrity.
As of publication, no official patched version has been released; the vendor has not provided a fix [3]. Users are advised to restrict access to the vulnerable endpoint, implement strict input validation, or consider migrating to an alternative solution if the application is no longer supported.
- GitHub - devcode-it/openstamanager: OpenSTAManager è un software gestionale open-source basato su web, sviluppato in PHP con database MySQL. Serve a gestire l'assistenza tecnica e la fatturazione elettronica per piccole e medie imprese. Include moduli per la contabilità, la gestione del magazzino, le anagrafiche di clienti e fornitori, i documenti di vendita e acquisto.
- NVD - CVE-2026-24418
- SQL Injection vulnerability in the Scadenzario bulk operations module
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
devcode-it/openstamanagerPackagist | <= 2.9.8 | — |
Affected products
2- Range: <=2.9.8
- devcode-it/openstamanagerv5Range: <= 2.9.8
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/advisories/GHSA-4xwv-49c8-fvhqghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-24418ghsaADVISORY
- github.com/devcode-it/openstamanager/security/advisories/GHSA-4xwv-49c8-fvhqghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.