RT is an open source, enterprise-grade issue and ticket tracking system. Versions 5.0.0 through 5.0.9 and 6.0.0 through 6.0.2 contain an SQL injection vulnerability. An authenticated user can craft input that is incorporated into database queries without proper validation, potentially allowing them to read or modify data in the RT database. This issue has been fixed in versions 5.0.10 and 6.0.3. If developers are unable to upgrade immediately, they can temporarily work around this issue by restricting RT account access to trusted users.
Metrics
Affected Vendors & Products
References
History
Fri, 22 May 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Bestpractical
Bestpractical rt |
|
| Vendors & Products |
Bestpractical
Bestpractical rt |
Fri, 22 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RT is an open source, enterprise-grade issue and ticket tracking system. Versions 5.0.0 through 5.0.9 and 6.0.0 through 6.0.2 contain an SQL injection vulnerability. An authenticated user can craft input that is incorporated into database queries without proper validation, potentially allowing them to read or modify data in the RT database. This issue has been fixed in versions 5.0.10 and 6.0.3. If developers are unable to upgrade immediately, they can temporarily work around this issue by restricting RT account access to trusted users. | |
| Title | RT: SQL injection via entry_aggregator parameter in JSON search | |
| Weaknesses | CWE-89 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-22T21:17:36.063Z
Reserved: 2026-04-16T16:43:03.175Z
Link: CVE-2026-41075
No data.
No data.
No data.
OpenCVE Enrichment
Updated: 2026-05-22T23:30:03Z