A high-severity arbitrary file read vulnerability, CVE-2026-22200, has been discovered in the widely-used open-source helpdesk system, osTicket. The flaw allows an unauthenticated attacker to exfiltrate sensitive files from the underlying server. The attack is carried out by submitting a support ticket containing a malicious PHP filter chain payload. When an agent or administrator exports this ticket using the 'Export to PDF' function, the server processes the malicious payload, causing the contents of an arbitrary file (e.g., config.php) to be rendered as a bitmap image within the PDF. This allows the attacker to reconstruct the file's contents. The vulnerability is particularly dangerous as it can be chained with other flaws like CVE-2024-2961 (CNEXT) to achieve full Remote Code Execution (RCE). Patches have been released, and administrators are urged to upgrade immediately.
phar:// stream wrapper and PHP filter chains within the PDF generation library used by osTicket. An attacker can craft a ticket with a payload like phar://data:;base64,PD9waHAgZWNobyBwaHBpbmZvKCk7ID8+/....A proof-of-concept is publicly available. While active widespread exploitation has not been confirmed, the public disclosure and ease of exploitation make it a likely target for attackers. The potential to chain this with other vulnerabilities for RCE, as demonstrated by researchers with CNEXT, significantly increases the risk.
phar://, php://filter, and other PHP stream wrappers.phar:// wrapper may be visible in logs.M1051 - Update Software.Upgrade osTicket to a patched version (1.18.3 or 1.17.4) to fix the root cause of the vulnerability.
Mapped D3FEND Techniques:
Use a Web Application Firewall (WAF) to filter for malicious PHP stream wrappers in incoming HTTP requests.
The definitive countermeasure for CVE-2026-22200 is to upgrade the osTicket application to a patched version, specifically 1.18.3 or 1.17.4. This is not a vulnerability that can be reliably mitigated with configuration changes alone, as it stems from how the application's code interacts with a core PHP feature. Administrators must prioritize this update, as the vulnerability allows unauthenticated attackers to read sensitive files, including the osTicket configuration file which contains database credentials. A successful exploit of this file read is often the first step toward a full system compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats