CVE-2026-24419
📋 TL;DR
OpenSTAManager v2.9.8 and earlier contain a critical SQL injection vulnerability in the Journal Entry module. Attackers can inject arbitrary SQL commands through the id_documenti parameter to extract sensitive database information via error messages. All users running affected versions are vulnerable.
💻 Affected Systems
- OpenSTAManager
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including extraction of all user credentials, financial data, customer information, and potential system takeover.
Likely Case
Extraction of sensitive business data including customer information, financial records, and authentication credentials leading to data breach.
If Mitigated
Limited data exposure if database permissions are restricted, but still significant information disclosure risk.
🎯 Exploit Status
Exploitation requires no authentication and uses simple SQL injection techniques with error-based extraction.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v2.9.9 or later
Vendor Advisory: https://github.com/devcode-it/openstamanager/security/advisories/GHSA-4j2x-jh4m-fqv6
Restart Required: No
Instructions:
1. Backup your OpenSTAManager installation and database. 2. Download latest version from official repository. 3. Replace affected files, particularly add.php in Prima Nota module. 4. Verify the fix by testing the vulnerable endpoint.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation to ensure id_documenti parameter contains only integers and commas
Modify add.php to validate: if (!preg_match('/^[0-9,]+$/', $_GET['id_documenti'])) { die('Invalid input'); }
WAF Rule
allImplement web application firewall rule to block SQL injection patterns in GET parameters
Add WAF rule: Detect and block patterns like UNION, SELECT, FROM, WHERE in id_documenti parameter
🧯 If You Can't Patch
- Disable Prima Nota module completely if not required
- Implement strict network segmentation and limit access to OpenSTAManager to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Test by accessing /prima_nota/add.php?id_documenti=1' OR test the endpoint with SQL injection payloads and observe error responses.
Check Version:
Check OpenSTAManager version in admin panel or review version.php file
Verify Fix Applied:
Attempt SQL injection payloads on the patched endpoint and verify no database errors are returned and input is properly sanitized.
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple requests to /prima_nota/add.php with SQL-like parameters
- XPATH error messages in logs
Network Indicators:
- HTTP GET requests containing SQL keywords in id_documenti parameter
- Unusual database query patterns from web server
SIEM Query:
source="web_logs" AND uri_path="/prima_nota/add.php" AND (query_string="*UNION*" OR query_string="*SELECT*" OR query_string="*FROM*")