VYPR
High severityNVD Advisory· Published Feb 6, 2026· Updated Feb 6, 2026

OpenSTAManager has an SQL Injection vulnerability in the Scadenzario bulk operations module

CVE-2026-24418

Description

OpenSTAManager is an open source management software for technical assistance and invoicing. OpenSTAManager v2.9.8 and earlier contain a critical Error-Based SQL Injection vulnerability in the bulk operations handler for the Scadenzario (Payment Schedule) module. The application fails to validate that elements of the id_records array are integers before using them in an SQL IN() clause, allowing attackers to inject arbitrary SQL commands and extract sensitive data through XPATH error messages.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

OpenSTAManager v2.9.8 and earlier contain a critical SQL injection in the Scadenzario module's bulk operations, allowing authenticated attackers to extract database contents via XPATH errors.

OpenSTAManager, an open-source management software for technical assistance and invoicing [1], is vulnerable to a critical error-based SQL injection in version 2.9.8 and earlier. The vulnerability resides in the bulk operations handler of the Scadenzario (Payment Schedule) module, where the application fails to validate that elements of the id_records POST array are integers before using them in an SQL IN() clause [2]. The array_clean() function only removes empty values and does not enforce type checking, allowing arbitrary SQL payloads to pass through [3].

Exploitation requires authentication and access to the /actions.php?id_module=18 endpoint, which processes bulk operations for the Scadenzario module [3]. An attacker can inject SQL commands via the id_records[] POST parameter, taking advantage of the fact that the vulnerable code directly concatenates array elements into the query string without parameterization or type validation [3].

The impact is severe: an attacker can leverage XPATH error messages to extract entire database contents, including user credentials, customer personally identifiable information (PII), and financial records [2][3]. This could lead to complete compromise of the application's data confidentiality and integrity.

As of publication, no official patched version has been released; the vendor has not provided a fix [3]. Users are advised to restrict access to the vulnerable endpoint, implement strict input validation, or consider migrating to an alternative solution if the application is no longer supported.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
devcode-it/openstamanagerPackagist
<= 2.9.8

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.