Description
A security flaw has been discovered in CRMEB up to 5.6.3. The affected element is the function appleLogin of the file crmeb/app/api/controller/v1/LoginController.php. Performing a manipulation of the argument openId results in improper authentication. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Patch ASAP
AI Analysis

Impact

The flaw resides in the appleLogin endpoint of CRMEB’s API. By manipulating the openId argument, an attacker can bypass authentication and obtain a valid session without legitimate credentials. This authentication bypass (CWE-287) enables remote attackers to impersonate any user, potentially accessing sensitive data and performing privileged actions. The vulnerability carries a CVSS score of 6.9, indicating moderate severity, and can be exploited over the network.

Affected Systems

CRMEB products up to version 5.6.3 are affected. The vulnerable code is located in crmeb/app/api/controller/v1/LoginController.php. No other vendors or product lines are listed.

Risk and Exploitability

The EPSS score of less than 1% suggests low but non-zero likelihood of exploitation, yet the public release of exploit code increases the real‑world risk. The flaw is not currently catalogued in CISA’s KEV, but the lack of vendor response means an open window remains. Remote attackers with network access to the API endpoint can craft a malicious openId value and gain unauthorized access without any additional constraints noted in the description.

Generated by OpenCVE AI on April 18, 2026 at 04:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade CRMEB to a version newer than 5.6.3 that resolves the appleLogin authentication bypass.
  • If an upgrade cannot be performed immediately, enforce strict server‑side validation of the openId parameter or require an additional token that is not supplied by the current payload.
  • Implement monitoring and logging of authentication attempts, and apply network filtering to block or rate‑limit access to the appleLogin endpoint from untrusted origins until a patch is available.

Generated by OpenCVE AI on April 18, 2026 at 04:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 29 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*

Tue, 20 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Crmeb
Crmeb crmeb
Vendors & Products Crmeb
Crmeb crmeb

Tue, 20 Jan 2026 01:15:00 +0000

Type Values Removed Values Added
Description A security flaw has been discovered in CRMEB up to 5.6.3. The affected element is the function appleLogin of the file crmeb/app/api/controller/v1/LoginController.php. Performing a manipulation of the argument openId results in improper authentication. The attack is possible to be carried out remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title CRMEB LoginController.php appleLogin improper authentication
Weaknesses CWE-287
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:51:37.891Z

Reserved: 2026-01-19T15:27:51.869Z

Link: CVE-2026-1202

cve-icon Vulnrichment

Updated: 2026-01-20T21:20:26.659Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-20T01:15:56.800

Modified: 2026-01-29T21:16:18.990

Link: CVE-2026-1202

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T05:00:06Z

Weaknesses