Impact
The vulnerability resides in the /api/store_integral/order/detail/:uni endpoint of Zhong Bang CRMEB versions up to 5.6.3. Manipulating the order_id argument bypasses proper authorization checks, allowing an attacker to retrieve details of orders that do not belong to the authenticated user, exposing sensitive business data.
Affected Systems
Affected systems include all installations of Zhong Bang CRMEB version 5.6.3 and older. The flaw is present in the CRMEB package for the specified CPE string and has been confirmed through public exploits.
Risk and Exploitability
The risk is moderate, with a CVSS score of 5.3, and the EPSS score indicates a very low probability of exploitation at this time; however, the flaw is publicly known and could be leveraged once an attacker gains network access. The vulnerability is not listed in the CISA KEV catalog, and the vendor has not yet released an official fix. The most likely attack vector is remote via the publicly exposed HTTP API, where an attacker can send crafted requests to the /detail endpoint.
OpenCVE Enrichment