CVE-2026-29782 PUBLISHED

OpenSTAManager: Remote Code Execution via Insecure Deserialization in OAuth2

Assigner: GitHub_M
Reserved: 04.03.2026 Published: 02.04.2026 Updated: 02.04.2026

OpenSTAManager is an open source management software for technical assistance and invoicing. Prior to version 2.10.2, the oauth2.php file in OpenSTAManager is an unauthenticated endpoint ($skip_permissions = true). It loads a record from the zz_oauth2 table using the attacker-controlled GET parameter state, and during the OAuth2 configuration flow calls unserialize() on the access_token field without any class restriction. This issue has been patched in version 2.10.2.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor devcode-it
Product openstamanager
Versions
  • Version < 2.10.2 is affected

References

Problem Types

  • CWE-502: Deserialization of Untrusted Data CWE