Description
A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-02-01
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Improper Authorization leading to unauthorized order detail disclosure
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the /api/store_integral/order/detail/:uni endpoint of Zhong Bang CRMEB versions up to 5.6.3. Manipulating the order_id argument bypasses proper authorization checks, allowing an attacker to retrieve details of orders that do not belong to the authenticated user, exposing sensitive business data.

Affected Systems

Affected systems include all installations of Zhong Bang CRMEB version 5.6.3 and older. The flaw is present in the CRMEB package for the specified CPE string and has been confirmed through public exploits.

Risk and Exploitability

The risk is moderate, with a CVSS score of 5.3, and the EPSS score indicates a very low probability of exploitation at this time; however, the flaw is publicly known and could be leveraged once an attacker gains network access. The vulnerability is not listed in the CISA KEV catalog, and the vendor has not yet released an official fix. The most likely attack vector is remote via the publicly exposed HTTP API, where an attacker can send crafted requests to the /detail endpoint.

Generated by OpenCVE AI on April 18, 2026 at 14:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of CRMEB that contains a fix for the /api/store_integral/order/detail/:uni authorization issue.
  • Restrict external access to the /api/store_integral/order/detail/:uni endpoint, limiting connections to trusted internal networks or VPNs.
  • Implement application‑level validation to ensure the order_id belongs to the authenticated user before returning any order details.

Generated by OpenCVE AI on April 18, 2026 at 14:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 11 Feb 2026 19:45:00 +0000

Type Values Removed Values Added
First Time appeared Crmeb
Crmeb crmeb
Weaknesses CWE-639
CPEs cpe:2.3:a:crmeb:crmeb:*:*:*:*:*:*:*:*
Vendors & Products Crmeb
Crmeb crmeb

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 03 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Zhongbangkeji
Zhongbangkeji crmeb
Vendors & Products Zhongbangkeji
Zhongbangkeji crmeb

Sun, 01 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Zhong Bang CRMEB :uni tidyOrder improper authorization
Weaknesses CWE-266
CWE-285
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:P/I:N/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 4.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T09:11:35.159Z

Reserved: 2026-02-01T07:35:30.209Z

Link: CVE-2026-1733

cve-icon Vulnrichment

Updated: 2026-02-03T14:33:32.748Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-01T23:15:49.483

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-1733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:30:02Z

Weaknesses