Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 09 May 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in osTicket up to 1.18.3. Impacted is an unknown function of the file include/class.dispatcher.php of the component Dispatcher. The manipulation of the argument _method leads to cross-site request forgery. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through a pull request but has not reacted yet. | |
| Title | osTicket Dispatcher class.dispatcher.php cross-site request forgery | |
| First Time appeared |
Osticket
Osticket osticket |
|
| Weaknesses | CWE-352 CWE-862 |
|
| CPEs | cpe:2.3:a:osticket:osticket:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Osticket
Osticket osticket |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-11T17:32:03.972Z
Reserved: 2026-05-08T20:09:05.918Z
Link: CVE-2026-8194
Updated: 2026-05-11T16:03:26.498Z
Status : Deferred
Published: 2026-05-09T20:16:30.320
Modified: 2026-05-11T15:11:48.807
Link: CVE-2026-8194
No data.
OpenCVE Enrichment
Updated: 2026-05-09T21:00:12Z