Impact
The vulnerability resides in CRMEB's JSON Token Handler, specifically the remoteRegister function in LoginServices.php. By manipulating the uid argument supplied during a registration request, an attacker can bypass the authentication logic and create or bind an account without proper credentials. This results in an authentication bypass, allowing the attacker to gain unauthorized access to the system.
Affected Systems
The affected vendor is CRMEB, and all releases up to version 5.6.3 are vulnerable. System owners running CRMEB 5.6.3 or earlier are potentially vulnerable. Upgrading to a newer release that excludes this flaw is recommended.
Risk and Exploitability
The CVSS score of 6.3 indicates moderate to high severity, but the EPSS score of fewer than 1% suggests that exploitation is currently unlikely in the wild. The exploit is remote, requires a high level of complexity, and the public exploit code is available, making it a difficult but feasible attack for a determined adversary. This weakness is classified as CWE-287 (Improper Authentication). The vulnerability has not yet been catalogued in CISA's KEV list.
OpenCVE Enrichment