Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Defaultfuction
Defaultfuction jeson Customer Relationship Management System |
|
| Vendors & Products |
Defaultfuction
Defaultfuction jeson Customer Relationship Management System |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in DefaultFuction Jeson-Customer-Relationship-Management-System up to 1b4679c4d06b90d31dd521c2b000bfdec5a36e00. This affects an unknown function of the file /api/System.php of the component API Module. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The identifier of the patch is f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476. It is suggested to install a patch to address this issue. | |
| Title | DefaultFuction Jeson-Customer-Relationship-Management-System API Module System.php server-side request forgery | |
| Weaknesses | CWE-918 | |
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-24T01:39:39.469Z
Reserved: 2026-03-23T06:08:02.864Z
Link: CVE-2026-4623
No data.
Status : Received
Published: 2026-03-24T03:16:06.660
Modified: 2026-03-24T03:16:06.660
Link: CVE-2026-4623
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:29:24Z