CVE-2026-27012
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (idgruppo) by directly calling modules/utenti/actions.php. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators.
Analysis
Privilege escalation and auth bypass in OpenSTAManager 2.9.8. PoC available.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify all systems running OpenSTAManager and isolate them from production networks if possible; enable enhanced logging and monitoring for exploitation attempts. Within 7 days: Implement network segmentation to restrict OpenSTAManager access to authorized users only; deploy WAF rules to block known exploit patterns; evaluate alternative software solutions. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-247v-7cw6-q57v