Vulnerability Description
OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Devcode | Openstamanager | < 2.10.2 |
Related Weaknesses (CWE)
References
- https://github.com/devcode-it/openstamanager/commit/d2e38cbdf91a831cefc0da1548e0Patch
- https://github.com/devcode-it/openstamanager/releases/tag/v2.10.2ProductRelease Notes
- https://github.com/devcode-it/openstamanager/security/advisories/GHSA-whv5-4q2f-ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-29782?
CVE-2026-29782 is a vulnerability with a CVSS score of 7.2 (HIGH). OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permis...
How severe is CVE-2026-29782?
CVE-2026-29782 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-29782?
Check the references section above for vendor advisories and patch information. Affected products include: Devcode Openstamanager.