Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gfi:helpdesk:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gfi
Gfi helpdesk |
|
| Vendors & Products |
Gfi
Gfi helpdesk |
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the language management functionality where the charset POST parameter is passed directly to SWIFT_Language::Create() without HTML sanitization and subsequently rendered unsanitized by View_Language.RenderGrid(). An authenticated administrator can inject arbitrary JavaScript through the charset field when creating or editing a language, and the payload executes in the browser of any administrator viewing the Languages page. | |
| Title | GFI HelpDesk < 4.99.9 Stored XSS via charset Parameter | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-21T13:31:13.580Z
Reserved: 2026-01-15T18:42:20.938Z
Link: CVE-2026-23753
Updated: 2026-04-21T13:31:08.448Z
Status : Analyzed
Published: 2026-04-20T18:16:24.137
Modified: 2026-04-27T15:07:29.780
Link: CVE-2026-23753
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:24Z