{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-35470","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-04-02T20:49:44.453Z","datePublished":"2026-04-06T17:40:32.973Z","dateUpdated":"2026-04-07T14:06:27.500Z"},"containers":{"cna":{"title":"OpenSTAManager has a SQL Injection via righe Parameter in confronta_righe Modals","problemTypes":[{"descriptions":[{"cweId":"CWE-89","lang":"en","description":"CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"name":"https://github.com/devcode-it/openstamanager/security/advisories/GHSA-mmm5-3g4x-qw39","tags":["x_refsource_CONFIRM"],"url":"https://github.com/devcode-it/openstamanager/security/advisories/GHSA-mmm5-3g4x-qw39"},{"name":"https://github.com/devcode-it/openstamanager/releases/tag/v2.10.2","tags":["x_refsource_MISC"],"url":"https://github.com/devcode-it/openstamanager/releases/tag/v2.10.2"}],"affected":[{"vendor":"devcode-it","product":"openstamanager","versions":[{"version":"< 2.10.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-06T17:40:32.973Z"},"descriptions":[{"lang":"en","value":"OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to 2.10.2, confronta_righe.php files across different modules in OpenSTAManager contain an SQL Injection vulnerability. The righe parameter received via $_GET['righe'] is directly concatenated into an SQL query without any sanitization, parameterization or validation. An authenticated attacker can inject arbitrary SQL statements to extract sensitive data from the database, including user credentials, customer information, invoice data and any other stored data. This vulnerability is fixed in 2.10.2."}],"source":{"advisory":"GHSA-mmm5-3g4x-qw39","discovery":"UNKNOWN"}},"adp":[{"references":[{"url":"https://github.com/devcode-it/openstamanager/security/advisories/GHSA-mmm5-3g4x-qw39","tags":["exploit"]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-07T14:06:23.923426Z","id":"CVE-2026-35470","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-07T14:06:27.500Z"}}]}}