🔐 CVE Alert

CVE-2026-23753

MEDIUM 4.8

GFI HelpDesk < 4.99.9 Stored XSS via charset Parameter

CVSS Score
4.8
EPSS Score
0.0%
EPSS Percentile
0th

GFI HelpDesk before 4.99.9 contains a stored cross-site scripting vulnerability in the language management functionality where the charset POST parameter is passed directly to SWIFT_Language::Create() without HTML sanitization and subsequently rendered unsanitized by View_Language.RenderGrid(). An authenticated administrator can inject arbitrary JavaScript through the charset field when creating or editing a language, and the payload executes in the browser of any administrator viewing the Languages page.

CWE CWE-79
Vendor gfi software
Product helpdesk
Published Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for gfi software helpdesk

Be the first to know when new medium vulnerabilities affecting gfi software helpdesk are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

GFI Software / HelpDesk
0 < 4.99.9

References

NVD ↗ CVE.org ↗ EPSS Data ↗
gfi.ai: https://gfi.ai/products-and-solutions/email-and-messaging-solutions/helpdesk/resources/product-releases vulncheck.com: https://www.vulncheck.com/advisories/gfi-helpdesk-stored-xss-via-charset-parameter

Credits

Alex Williams from Pellera Technologies VulnCheck