Impact
The vulnerability is a reflected cross‑site scripting flaw in the Zadarma telephony API of Rukovoditel CRM. An attacker can supply arbitrary content via the zd_echo GET parameter, which the application returns unchanged. When a victim opens a crafted URL, the injected script runs in the context of the application, permitting session hijacking, credential theft, phishing or account takeover. This is a classic input‑validation weakness, CWE‑79.
Affected Systems
The flaw affects Rukovoditel CRM versions 3.6.4 and earlier. The vulnerable endpoint is /api/tel/zadarma.php.
Risk and Exploitability
With a CVSS score of 9.3 the vulnerability is classified as Critical. No EPSS data is available and it is not listed in CISA’s KEV. The issue is exploitable without authentication through a simple URL, making it highly likely to be leveraged by attackers. Immediate action is required.
OpenCVE Enrichment