Description
A vulnerability has been found in Bdtask SalesERP up to 20260116. This issue affects some unknown processing of the component Administrative Endpoint. Such manipulation of the argument ci_session leads to improper authorization. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-29
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper authorization leading to potential discovery of administrative access
Action: Patch Now
AI Analysis

Impact

The vulnerability arises from improper authorization in a component of SalesERP's Administrative Endpoint. Manipulating the ci_session argument allows an attacker to bypass authentication controls, potentially granting administrative privileges. This flaw could lead to unauthorized configuration changes, data exposure, or system compromise. The reported CVSS score of 5.3 indicates moderate severity, and the exploitation pathway is feasible from a remote location.

Affected Systems

All instances of Bdtask SalesERP up to and including version 2026-01-16 are affected. Systems running these releases are at risk because the flaw resides in the Administration Endpoint of the application.

Risk and Exploitability

With an EPSS score below 1 % and no inclusion in CISA's KEV catalog, the likelihood of widespread exploitation is low. However, the remote attack vector—modifying the ci_session parameter to gain administrative access—poses a serious risk for exposed deployments. The absence of a vendor response or fix increases the exposure window, making remediation or protective measures urgent.

Generated by OpenCVE AI on April 18, 2026 at 14:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to a SalesERP version newer than 2026-01-16 or apply the vendor's official fix as soon as it becomes available
  • Restrict access to the Administrative Endpoint by limiting it to trusted networks or applying IP whitelisting
  • Implement stricter input validation on the ci_session parameter or disable its ability to influence authorization
  • Monitor administrative actions and account activity for signs of elevated privileges

Generated by OpenCVE AI on April 18, 2026 at 14:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bdtask:saleserp:*:*:*:*:*:*:*:*

Fri, 20 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:bdtask:saleserp:2026-01-16:*:*:*:*:*:*:*

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Bdtask
Bdtask saleserp
Vendors & Products Bdtask
Bdtask saleserp

Thu, 29 Jan 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Bdtask SalesERP up to 20260116. This issue affects some unknown processing of the component Administrative Endpoint. Such manipulation of the argument ci_session leads to improper authorization. The attack may be performed from remote. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Bdtask SalesERP Administrative Endpoint improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:05:43.347Z

Reserved: 2026-01-29T08:44:28.621Z

Link: CVE-2026-1597

cve-icon Vulnrichment

Updated: 2026-01-29T21:27:34.775Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T17:16:24.473

Modified: 2026-02-20T14:43:40.990

Link: CVE-2026-1597

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:45:03Z

Weaknesses