Sysaid Sysaid

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Sysaid product.

RSS Feeds for Sysaid security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Sysaid products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Sysaid Sorted by Most Security Vulnerabilities since 2018

Sysaid22 vulnerabilities

Sysaid On Premises7 vulnerabilities

Sysaid Help Desk4 vulnerabilities

Sysaid Itil1 vulnerability

Sysaid Okta Sso1 vulnerability

Sysaid On Premise1 vulnerability

Sysaidsy On Premises1 vulnerability

Known Exploited Sysaid Vulnerabilities

The following Sysaid vulnerabilities have been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability SysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
CVE-2025-2775 Exploit Probability: 69.8%
July 22, 2025
SysAid On-Prem Improper Restriction of XML External Entity Reference Vulnerability SysAid On-Prem contains an improper restriction of XML external entity reference vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
CVE-2025-2776 Exploit Probability: 62.6%
July 22, 2025
SysAid Server Path Traversal Vulnerability SysAid Server (on-premises version) contains a path traversal vulnerability that leads to code execution.
CVE-2023-47246 Exploit Probability: 94.4%
November 13, 2023

The vulnerability CVE-2023-47246: SysAid Server Path Traversal Vulnerability is in the top 1% of the currently known exploitable vulnerabilities. 2 known exploited Sysaid vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.

By the Year

In 2026 there have been 0 vulnerabilities in Sysaid. Last year, in 2025 Sysaid had 3 security vulnerabilities published. Right now, Sysaid is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 3 9.30
2024 3 9.80
2023 5 6.86
2022 14 7.44
2021 4 6.58
2020 2 7.95

It may take a day or so for new Sysaid vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Sysaid Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-2775 May 07, 2025
SysAid On-Prem <=23.3.40 XXE in Checkin allows admin takeover SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Checkin processing functionality, allowing for administrator account takeover and file read primitives.
Sysaid
Sysaid On Premises
CVE-2025-2776 May 07, 2025
SysAid On-Prem <=23.3.40 Vulnerable to Unauth XXE (CVE-2025-2776) SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the Server URL processing functionality, allowing for administrator account takeover and file read primitives.
Sysaid
Sysaid On Premises
CVE-2025-2777 May 07, 2025
SysAid On-Prem XXE (<=23.3.40) Enables Admin Takeover SysAid On-Prem versions <= 23.3.40 are vulnerable to an unauthenticated XML External Entity (XXE) vulnerability in the lshw processing functionality, allowing for administrator account takeover and file read primitives.
Sysaid
Sysaid On Premises
CVE-2024-36393 Jun 06, 2024
SysAid (CVE-2024-36393) SQLi (CWE-89) in DB Layer SysAid - CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Sysaid
CVE-2024-36394 Jun 06, 2024
SysAid OS Command Injection via Special Element Exploit SysAid - CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Sysaid
CVE-2024-27775 Mar 28, 2024
SysAid <23.2.14b18 SSRF Exposes NTLMv2 Hash SysAid before version 23.2.14 b18 - CWE-918: Server-Side Request Forgery (SSRF) may allow exposing the local OS user's NTLMv2 hash
Sysaid
CVE-2023-47247 Dec 25, 2023
SysAid On-Premise 23.3.34: Unprivileged End-User Can Delete KB Articles In SysAid On-Premise before 23.3.34, there is an edge case in which an end user is able to delete a Knowledge Base article, aka bug 15102.
Sysaid
CVE-2023-33706 Nov 24, 2023
SysAid <23.2.15 IDOR via sid/srID in EmailHtmlSourceIframe.jsp SysAid before 23.2.15 allows Indirect Object Reference (IDOR) attacks to read ticket data via a modified sid parameter to EmailHtmlSourceIframe.jsp or a modified srID parameter to ShowMessage.jsp.
Sysaid
CVE-2023-47246 Nov 10, 2023
SysAid On-Premise <=23.3.35 Path Traversal to Code Exec (Tomcat Webroot) In SysAid On-Premise before 23.3.36, a path traversal vulnerability leads to code execution after an attacker writes a file to the Tomcat webroot, as exploited in the wild in November 2023.
Sysaid On Premises
Sysaid
CVE-2023-32225 Jul 30, 2023
Unrestricted File Upload in Sysaid (CVE-2023-32225) Sysaid - CWE-434: Unrestricted Upload of File with Dangerous Type -  A malicious user with administrative privileges may be able to upload a dangerous filetype via an unspecified method.
Sysaid On Premises
Sysaid
CVE-2023-32226 Jul 30, 2023
Sysaid Authenticated File Exfiltration via CWE-552 Sysaid - CWE-552: Files or Directories Accessible to External Parties -  Authenticated users may exfiltrate files from the server via an unspecified method.
Sysaid On Premises
Sysaid
CVE-2022-40322 Sep 11, 2022
SysAid Help Desk <22.1.65 XSS Vulnerability SysAid Help Desk before 22.1.65 allows XSS, aka FR# 66542 and 65579.
Help Desk
CVE-2022-40324 Sep 11, 2022
SysAid Help Desk <=22.1.65 XSS via Linked SRs Field SysAid Help Desk before 22.1.65 allows XSS via the Linked SRs field, aka FR# 67258.
Help Desk
CVE-2022-40325 Sep 11, 2022
SysAid Help Desk XSS via Asset Dashboard before 22.1.65 SysAid Help Desk before 22.1.65 allows XSS via the Asset Dashboard, aka FR# 67262.
Help Desk
CVE-2022-40323 Sep 11, 2022
XSS in SysAid Help Desk (Password Services) before 22.1.65 SysAid Help Desk before 22.1.65 allows XSS in the Password Services module, aka FR# 67241.
Help Desk
CVE-2022-23170 Jun 24, 2022
SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability SysAid - Okta SSO integration - was found vulnerable to XML External Entity Injection vulnerability. Any SysAid environment that uses the Okta SSO integration might be vulnerable. An unauthenticated attacker could exploit the XXE vulnerability by sending a malformed POST request to the identity provider endpoint. An attacker can extract the identity provider endpoint by decoding the SAMLRequest parameter's value and searching for the AssertionConsumerServiceURL parameter's value. It often allows an attacker to view files on the application server filesystem and interact with any back-end or external systems that the application can access. In some situations, an attacker can escalate an XXE attack to compromise the underlying server or other back-end infrastructure by leveraging the XXE vulnerability to perform server-side request forgery (SSRF) attacks.
Okta Sso
CVE-2022-22796 May 12, 2022
Sysaid Sysaid System Takeover - An attacker Sysaid Sysaid System Takeover - An attacker can bypass the authentication process by accessing to: /wmiwizard.jsp, Then to: /ConcurrentLogin.jsp, then click on the login button, and it will redirect you to /home.jsp without any authentication.
Sysaid
CVE-2022-22797 May 12, 2022
Sysaid sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" Sysaid sysaid Open Redirect - An Attacker can change the redirect link at the parameter "redirectURL" from"GET" request from the url location: /CommunitySSORedirect.jsp?redirectURL=https://google.com. Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
Sysaid
CVE-2022-22798 May 12, 2022
Sysaid Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after Sysaid Pro Plus Edition, SysAid Help Desk Broken Access Control v20.4.74 b10, v22.1.20 b62, v22.1.30 b49 - An attacker needs to log in as a guest after that the system redirects him to the service portal or EndUserPortal.JSP, then he needs to change the path in the URL to /ConcurrentLogin%2ejsp after that he will receive an error message with a login button, by clicking on it, he will connect to the system dashboard. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system.
Sysaid
CVE-2022-23165 May 12, 2022
Sysaid Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers Sysaid Sysaid 14.2.0 Reflected Cross-Site Scripting (XSS) - The parameter "helpPageName" used by the page "/help/treecontent.jsp" suffers from a Reflected Cross-Site Scripting vulnerability. For an attacker to exploit this Cross-Site Scripting vulnerability, it's necessary for the affected product to expose the Offline Help Pages. An attacker may gain access to sensitive information or execute client-side code in the browser session of the victim user. Furthermore, an attacker would require the victim to open a malicious link. An attacker may exploit this vulnerability in order to perform phishing attacks. The attacker can receive sensitive data like server details, usernames, workstations, etc. He can also perform actions such as uploading files, deleting calls from the system
Sysaid
CVE-2022-23166 May 12, 2022
Sysaid Sysaid Local File Inclusion (LFI) An unauthenticated attacker Sysaid Sysaid Local File Inclusion (LFI) An unauthenticated attacker can access to the system by accessing to "/lib/tinymce/examples/index.html" path. in the "Insert/Edit Embedded Media" window Choose Type : iFrame and File/URL : [here is the LFI] Solution: Update to 22.2.20 cloud version, or to 22.1.64 on premise version.
Sysaid
CVE-2021-43972 Jan 11, 2022
An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 An unrestricted file copy vulnerability in /UserSelfServiceSettings.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to copy arbitrary files on the server filesystem to the web root (with an arbitrary filename) via the tempFile and fileName parameters in the HTTP POST body.
Sysaid
CVE-2021-43973 Jan 11, 2022
An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 An unrestricted file upload vulnerability in /UploadPsIcon.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to upload an arbitrary file via the file parameter in the HTTP POST body. A successful request returns the absolute, server-side filesystem path of the uploaded file.
Sysaid
CVE-2021-43974 Jan 11, 2022
An issue was discovered in SysAid ITIL 20.4.74 b10 An issue was discovered in SysAid ITIL 20.4.74 b10. The /enduserreg endpoint is used to register end users anonymously, but does not respect the server-side setting that determines if anonymous users are allowed to register new accounts. Configuring the server-side setting to disable anonymous user registration only hides the client-side registration form. An attacker can still post registration data to create new accounts without prior authentication.
Itil
CVE-2021-43971 Jan 11, 2022
A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 A SQL injection vulnerability in /mobile/SelectUsers.jsp in SysAid ITIL 20.4.74 b10 allows a remote authenticated attacker to execute arbitrary SQL commands via the filterText parameter.
Sysaid
CVE-2021-36721 Dec 14, 2021
Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names Sysaid API User Enumeration - Attacker sending requests to specific api path without any authorization before 21.3.60 version could get users names from the LDAP server.
Application Programming Interface
CVE-2021-31862 Oct 29, 2021
SysAid 20.4.74 allows XSS SysAid 20.4.74 allows XSS via the KeepAlive.jsp stamp parameter without any authentication.
Sysaid
CVE-2021-30486 Jul 22, 2021
SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection SysAid 20.3.64 b14 is affected by Blind and Stacker SQL injection via AssetManagementChart.jsp (GET computerID), AssetManagementChart.jsp (POST group1), AssetManagementList.jsp (GET computerID or group1), or AssetManagementSummary.jsp (GET group1).
Sysaid
CVE-2021-30049 Jul 22, 2021
SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) SysAid 20.3.64 b14 is affected by Cross Site Scripting (XSS) via a /KeepAlive.jsp?stamp= URI.
Sysaid
CVE-2020-13168 Oct 02, 2020
SysAid 20.1.11b26 allows reflected XSS SysAid 20.1.11b26 allows reflected XSS via the ForgotPassword.jsp accountid parameter.
Sysaidsy On Premises
Sysaid On Premises
CVE-2020-10569 Apr 21, 2020
SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack SysAid On-Premise 20.1.11, by default, allows the AJP protocol port, which is vulnerable to a GhostCat attack. Additionally, it allows unauthenticated access to upload files, which can be used to execute commands on the system by chaining it with a GhostCat attack. NOTE: This may be a duplicate of CVE-2020-1938
On Premise
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.