CVE-2026-2545
Plain English Summary
AI-powered analysis for quick understanding
An attacker can exploit a weakness in LigeroSmart to inject malicious scripts into web pages viewed by other users, potentially stealing sensitive information or hijacking user sessions. This vulnerability can be triggered remotely through a specific URL, and it affects versions up to 6.1.26, but the vendor has not yet addressed the issue.
Technical Description
A weakness has been identified in LigeroSmart up to 6.1.26. Impacted is an unknown function of the file /otrs/index.pl?Action=AgentTicketSearch. This manipulation of the argument Profile causes cross site scripting. The attack may be initiated remotely. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago
Vendor
ligerosmart
Product
ligerosmart
Related Vulnerabilities
An attacker can inject malicious scripts into the LigeroSmart application, which could allow them to steal sensitive information from users or manipulate their sessions. This vulnerability affects versions up to 6.1.26 and can be exploited remotely by manipulating a specific part of the web application without needing any special access.
This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users, potentially stealing sensitive information or performing actions on behalf of those users. It can be exploited remotely by manipulating a specific parameter in the application's code, and the issue has been publicly disclosed without a fix from the vendor.