{"id":"CVE-2026-27012","summary":"Unauthenticated privilege escalation in OpenSTAManager via modules/utenti/actions.php","details":"OpenSTAManager is an open source management software for technical assistance and invoicing. In 2.9.8 and earlier, a privilege escalation and authentication bypass vulnerability in OpenSTAManager allows any attacker to arbitrarily change a user's group (idgruppo) by directly calling modules/utenti/actions.php. This can promote an existing account (e.g. agent) into the Amministratori group as well as demote any user including existing administrators.","aliases":["GHSA-247v-7cw6-q57v"],"modified":"2026-04-10T05:37:04.071198Z","published":"2026-03-03T21:53:01.002Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27012.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-306"]},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/27xxx/CVE-2026-27012.json"},{"type":"ADVISORY","url":"https://github.com/devcode-it/openstamanager/security/advisories/GHSA-247v-7cw6-q57v"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-27012"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/devcode-it/openstamanager","events":[{"introduced":"0"},{"last_affected":"5ff39df9be26ee52f5a1f100754884072bbf82df"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.9.8"}]}}],"versions":["v2.3-beta.1","v2.3-beta.2","v2.4","v2.4.10","v2.4.11","v2.4.12","v2.4.13","v2.4.14","v2.4.16","v2.4.17","v2.4.2","v2.4.20","v2.4.22","v2.4.23","v2.4.24","v2.4.25","v2.4.28","v2.4.3","v2.4.32","v2.4.38","v2.4.4","v2.4.40","v2.4.41","v2.4.42","v2.4.43","v2.4.44","v2.4.47","v2.4.49","v2.4.51","v2.4.53","v2.4.54","v2.4.6","v2.4.8","v2.4.9","v2.5","v2.5.1-beta","v2.5.2-beta","v2.5.3","v2.5.4","v2.5.5","v2.6.1","v2.6.2","v2.9","v2.9-beta","v2.9.2","v2.9.3","v2.9.4","v2.9.5","v2.9.6","v2.9.7","v2.9.8"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-27012.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}