Cyber Posture

CVE-2026-35168

HighPublic PoC

Published: 02 April 2026

Published
02 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0009 25.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-35168 is a high-severity SQL Injection (CWE-89) vulnerability in Devcode Openstamanager. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 25.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly requires remediation of the SQL injection flaw in OpenSTAManager's Aggiornamenti module by patching to version 2.10.2 or later.

prevent

Requires validation of the JSON array of SQL statements in POST requests to the database conflict resolution feature, preventing arbitrary SQL execution.

detect

Provides vulnerability scanning to identify the SQL injection vulnerability in the Updates module prior to exploitation.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

SQL injection in web application module allows direct execution of arbitrary SQL statements over the network, enabling exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the Aggiornamenti (Updates) module in OpenSTAManager contains a database conflict resolution feature (op=risolvi-conflitti-database) that accepts a JSON array of SQL statements via POST and…

more

executes them directly against the database without any validation, allowlist, or sanitization. An authenticated attacker with access to the Aggiornamenti module can execute arbitrary SQL statements including CREATE, DROP, ALTER, INSERT, UPDATE, DELETE, SELECT INTO OUTFILE, and any other SQL command supported by the MySQL server. Foreign key checks are explicitly disabled before execution (SET FOREIGN_KEY_CHECKS=0), further reducing database integrity protections. This issue has been patched in version 2.10.2.

Deeper analysisAI

CVE-2026-35168 is a SQL injection vulnerability (CWE-89) affecting OpenSTAManager, an open source management software for technical assistance and invoicing, in versions prior to 2.10.2. The issue lies in the Aggiornamenti (Updates) module's database conflict resolution feature (op=risolvi-conflitti-database), which accepts a JSON array of SQL statements via POST requests and executes them directly against the underlying MySQL database without any validation, allowlist, or sanitization. Foreign key checks are explicitly disabled prior to execution via SET FOREIGN_KEY_CHECKS=0, weakening database integrity protections. The vulnerability carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated attacker with access to the Aggiornamenti module can exploit this flaw over the network with low complexity and no user interaction required. By crafting and submitting a malicious JSON payload containing arbitrary SQL statements, the attacker can execute commands such as CREATE, DROP, ALTER, INSERT, UPDATE, DELETE, SELECT INTO OUTFILE, and any other MySQL-supported operations, potentially leading to full database compromise, data exfiltration, modification, or destruction.

The vulnerability has been patched in OpenSTAManager version 2.10.2. Mitigation involves upgrading to this version or later. Relevant resources include the patching commit at https://github.com/devcode-it/openstamanager/commit/43970676bcd6636ff8663652fd82579f737abb74, the release announcement at https://github.com/devcode-it/openstamanager/releases/tag/v2.10.2, and the GitHub security advisory at https://github.com/devcode-it/openstamanager/security/advisories/GHSA-2fr7-cc4f-wh98.

Details

CWE(s)

Affected Products

devcode
openstamanager
≤ 2.10.2

CVEs Like This One

CVE-2025-69213Same product: Devcode Openstamanager
CVE-2025-69214Same product: Devcode Openstamanager
CVE-2025-69215Same product: Devcode Openstamanager
CVE-2026-35470Same product: Devcode Openstamanager
CVE-2026-28805Same product: Devcode Openstamanager
CVE-2026-29782Same product: Devcode Openstamanager
CVE-2025-69212Same product: Devcode Openstamanager
CVE-2026-27012Same product: Devcode Openstamanager
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89

References