CVE-2026-2547
Plain English Summary
AI-powered analysis for quick understanding
An attacker can inject malicious scripts into the LigeroSmart application, which could allow them to steal sensitive information from users or manipulate their sessions. This vulnerability affects versions up to 6.1.26 and can be exploited remotely by manipulating a specific part of the web application without needing any special access.
Technical Description
A vulnerability was detected in LigeroSmart up to 6.1.26. The impacted element is the function AgentDashboard of the file /otrs/index.pl. Performing a manipulation of the argument Subaction results in cross site scripting. Remote exploitation of the attack is possible. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 16, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago
Vendor
ligerosmart
Product
ligerosmart
Related Vulnerabilities
This vulnerability allows an attacker to inject malicious scripts into a web page viewed by users, potentially stealing sensitive information or performing actions on behalf of those users. It can be exploited remotely by manipulating a specific parameter in the application's code, and the issue has been publicly disclosed without a fix from the vendor.
An attacker can exploit a weakness in LigeroSmart to inject malicious scripts into web pages viewed by other users, potentially stealing sensitive information or hijacking user sessions. This vulnerability can be triggered remotely through a specific URL, and it affects versions up to 6.1.26, but the vendor has not yet addressed the issue.