Multiple vulnerabilities in Stel Order

Posted date 14/05/2026
Identificador
INCIBE-2026-351
Importance
4 - High
Affected Resources

Stel Order platform, versions 3.25.1 and earlier.

Description

INCIBE has coordinated the disclosure of two high- and medium-severity vulnerabilities affecting the Stel Order platform, a comprehensive cloud-based management software. The vulnerabilities were discovered by Manuel Gomez Argandoña and David Padilla Alvarado, respectively.
These vulnerabilities have been assigned the following codes, CVSS v4.0 base score, CVSS vector, and CWE vulnerability type for each vulnerability:

  • CVE-2026-5798: CVSS v4.0 7.1 | AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N | CWE-639
  • CVE-2026-5790: CVSS v4.0: 5.1 | CVSS AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N | CWE-79
Solution

There is no solution reported at this time.

Detail
  • CVE-2026-5798: unsafe object reference (IDOR) in Stel Order v3.25.1 and earlier versions, specifically in the ‘/app/FrontController’ endpoint, through manipulation of the ‘employeeID’ parameter. An authenticated attacker could exploit this vulnerability to access information about any employee (first names, last names, roles, job titles, and vacation records, among others) by modifying that identifier in requests sent to the server.
  • CVE-2026-5790: stored Cross-Site Scripting (XSS) in Stel Order v3.25.1 and earlier, located at the ‘/app/FrontController’ endpoint via the ‘legalName’ and ‘employeeID’ parameters. The lack of proper input sanitization allows an attacker to inject malicious code that is persistently stored in the database. When other users or administrators access the affected sections, the code executes in their browsers, enabling the theft of session cookies and account hijacking.
     
CVE
Identificador CVE Severidad Explotación Fabricante
CVE-2026-5790 Media No Stel Order
CVE-2026-5798 Alta No Stel Order
References list