OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2.
Metrics
Affected Vendors & Products
References
History
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Devcode
Devcode openstamanager |
|
| Vendors & Products |
Devcode
Devcode openstamanager |
Thu, 02 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2. | |
| Title | OpenSTAManager: Remote Code Execution via Insecure Deserialization in OAuth2 | |
| Weaknesses | CWE-502 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-04-02T13:42:25.134Z
Updated: 2026-04-03T19:52:52.158Z
Reserved: 2026-03-04T16:26:02.898Z
Link: CVE-2026-29782
Updated: 2026-04-03T19:52:47.217Z
Status : Awaiting Analysis
Published: 2026-04-02T14:16:27.237
Modified: 2026-04-03T16:10:52.680
Link: CVE-2026-29782
No data.