{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-1049","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2026-01-16T16:38:48.292Z","datePublished":"2026-01-17T17:32:05.916Z","dateUpdated":"2026-02-26T15:56:50.721Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-23T08:33:12.133Z"},"title":"LigeroSmart index.pl cross site scripting","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-79","lang":"en","description":"Cross Site Scripting"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"Code Injection"}]}],"affected":[{"vendor":"n/a","product":"LigeroSmart","versions":[{"version":"6.1.0","status":"affected"},{"version":"6.1.1","status":"affected"},{"version":"6.1.2","status":"affected"},{"version":"6.1.3","status":"affected"},{"version":"6.1.4","status":"affected"},{"version":"6.1.5","status":"affected"},{"version":"6.1.6","status":"affected"},{"version":"6.1.7","status":"affected"},{"version":"6.1.8","status":"affected"},{"version":"6.1.9","status":"affected"},{"version":"6.1.10","status":"affected"},{"version":"6.1.11","status":"affected"},{"version":"6.1.12","status":"affected"},{"version":"6.1.13","status":"affected"},{"version":"6.1.14","status":"affected"},{"version":"6.1.15","status":"affected"},{"version":"6.1.16","status":"affected"},{"version":"6.1.17","status":"affected"},{"version":"6.1.18","status":"affected"},{"version":"6.1.19","status":"affected"},{"version":"6.1.20","status":"affected"},{"version":"6.1.21","status":"affected"},{"version":"6.1.22","status":"affected"},{"version":"6.1.23","status":"affected"},{"version":"6.1.24","status":"affected"},{"version":"6.1.25","status":"affected"},{"version":"6.1.26","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in LigeroSmart up to 6.1.26. The affected element is an unknown function of the file /otrs/index.pl. Such manipulation of the argument TicketID leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":5.1,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":3.5,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV3_0":{"version":"3.0","baseScore":3.5,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R","baseSeverity":"LOW"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2026-01-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2026-01-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-18T00:39:04.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"chor4o (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.341601","name":"VDB-341601 | LigeroSmart index.pl cross site scripting","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.341601","name":"VDB-341601 | CTI Indicators (IOB, IOC, TTP, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.729402","name":"Submit #729402 | LigeroSmart 6.1.26 Cross Site Scripting","tags":["third-party-advisory"]},{"url":"https://vuldb.com/?submit.746919","name":"Submit #746919 | LigeroSmart 6.1.27 Cross-Site Scripting vulnerability LigeroSmart version 6.1.27 (Duplicate)","tags":["third-party-advisory"]},{"url":"https://github.com/LigeroSmart/ligerosmart/issues/280","tags":["issue-tracking"]},{"url":"https://github.com/LigeroSmart/ligerosmart/issues/280#issue-3776580352","tags":["exploit","issue-tracking"]},{"url":"https://github.com/LigeroSmart/ligerosmart/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-01-20T21:33:24.631761Z","id":"CVE-2026-1049","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:56:50.721Z"}}]}}