Plattform
php
Komponente
rukovoditel
Behoben in
3.7
CVE-2026-31845 describes a reflected cross-site scripting (XSS) vulnerability present in Rukovoditel CRM versions 3.6.4 and earlier. This vulnerability allows an attacker to inject malicious JavaScript code into the application, potentially compromising user accounts and sensitive data. The affected versions are 3.6.4 and earlier, with a fix available in version 3.7.
The vulnerability lies within the Zadarma telephony API endpoint (/api/tel/zadarma.php) where the 'zd_echo' GET parameter is directly reflected into the HTTP response without proper sanitization. An attacker can craft a malicious URL containing JavaScript payloads. When a victim clicks this link, the payload executes in their browser context, allowing the attacker to steal cookies, redirect the user to a phishing site, or perform actions on their behalf. The potential impact includes account takeover, data theft, and defacement of the CRM interface. This XSS vulnerability could be leveraged to gain unauthorized access to sensitive customer data stored within the CRM system.
This vulnerability was publicly disclosed on 2026-04-11. No known public proof-of-concept exploits are currently available, but the simplicity of the vulnerability suggests a high likelihood of exploitation. The CVSS score of 9.3 (CRITICAL) indicates a significant risk. It is not currently listed on CISA KEV.
Organizations using Rukovoditel CRM versions 3.6.4 and earlier, particularly those relying on the Zadarma telephony integration, are at significant risk. Shared hosting environments where multiple customers share the same CRM instance are especially vulnerable, as a compromise of one customer could potentially impact others.
• php: Examine web server access logs for requests containing the 'zd_echo' parameter with unusual or obfuscated values.
grep 'zd_echo=[a-zA-Z0-9;,"'<>]' /var/log/apache2/access.log• generic web: Use curl to test the endpoint with a simple JavaScript payload: curl 'http://your-crm-url/api/tel/zadarma.php?zd_echo=<script>alert("XSS")</script>' and check the response for the alert box.
• generic web: Check response headers for Content-Type: text/html when the 'zd_echo' parameter is present, indicating potential lack of proper encoding.
disclosure
Exploit-Status
EPSS
0.02% (5% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade Rukovoditel CRM to version 3.7 or later, which contains the necessary fix. If upgrading immediately is not possible, implement a Web Application Firewall (WAF) rule to block requests containing suspicious characters or patterns in the 'zdecho' parameter. Additionally, carefully review and sanitize all user-supplied input before reflecting it in the HTTP response. Consider implementing strict content security policy (CSP) headers to limit the sources from which scripts can be executed. After upgrading, confirm the vulnerability is resolved by attempting to inject a simple JavaScript payload via the 'zdecho' parameter and verifying that it is not executed.
Actualice a la versión 3.7 o posterior de Rukovoditel CRM. Esta versión incluye validación de entrada y codificación de salida para prevenir la inyección de scripts.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-31845 is a critical reflected XSS vulnerability in Rukovoditel CRM versions 3.6.4–3.7, allowing attackers to inject malicious JavaScript via the 'zd_echo' parameter in the Zadarma telephony API.
If you are using Rukovoditel CRM versions 3.6.4 or earlier, you are vulnerable to this XSS attack. Upgrade to version 3.7 to mitigate the risk.
The recommended fix is to upgrade Rukovoditel CRM to version 3.7 or later. As a temporary workaround, implement a WAF rule to filter requests containing the 'zd_echo' parameter.
While no active exploitation has been confirmed, the vulnerability's simplicity suggests a high probability of exploitation. Monitor your systems closely.
Refer to the official Rukovoditel CRM security advisory for detailed information and updates regarding CVE-2026-31845.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.