OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (idgruppo) by directly calling modules/utenti/actions.php. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators.
References
| Link | Resource |
|---|---|
| https://github.com/devcode-it/openstamanager/security/advisories/GHSA-247v-7cw6-q57v | Exploit Vendor Advisory |
Configurations
History
05 Mar 2026, 18:19
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:devcode:openstamanager:*:*:*:*:*:*:*:* | |
| References | () https://github.com/devcode-it/openstamanager/security/advisories/GHSA-247v-7cw6-q57v - Exploit, Vendor Advisory | |
| First Time |
Devcode openstamanager
Devcode |
03 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-03 22:16
Updated : 2026-03-05 18:19
NVD link : CVE-2026-27012
Mitre link : CVE-2026-27012
CVE.ORG link : CVE-2026-27012
JSON object : View
Products Affected
devcode
- openstamanager
CWE
CWE-306
Missing Authentication for Critical Function
