Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:gfi:helpdesk:*:*:*:*:*:*:*:* |
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gfi
Gfi helpdesk |
|
| Vendors & Products |
Gfi
Gfi helpdesk |
Mon, 20 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the Troubleshooter module where the subject POST parameter is not sanitized in Controller_Step.InsertSubmit() and EditSubmit() before being rendered by View_Step.RenderViewSteps(). An authenticated staff member can inject arbitrary JavaScript into the step subject field, and the payload executes when any user navigates to Troubleshooter > View Troubleshooter and clicks the affected step link. | |
| Title | GFI HelpDesk < 4.99.9 Stored XSS via Troubleshooter Step Subject | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-20T18:08:49.925Z
Reserved: 2026-01-15T18:42:20.938Z
Link: CVE-2026-23756
Updated: 2026-04-20T18:08:45.854Z
Status : Analyzed
Published: 2026-04-20T18:16:24.297
Modified: 2026-04-27T15:02:15.440
Link: CVE-2026-23756
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:47:27Z