Impact
A flaw in the DefaultFuction Jeson‑Customer‑Relationship‑Management‑System API Module allows remote actors to manipulate the url parameter in /api/System.php, causing the server to issue arbitrary outbound HTTP requests. This server‑side request forgery can expose internal resources, exfiltrate information, or trigger unintended actions within the network. The weakness is a classic SSRF scenario (CWE‑918).
Affected Systems
The vulnerability affects the DefaultFuction Jeson‑Customer‑Relationship‑Management‑System. No precise version numbers are available because the product uses rolling releases; all code up to commit 1b4679c4d06b90d31dd521c2b000bfdec5a36e00 is impacted. The patch is identified by the commit hash f76e7123fe093b8675f88ec8f71725b0dd186310/98bd4eb07fa19d4f2c5228de6395580013c97476.
Risk and Exploitability
With a CVSS score of 6.9 the flaw carries medium to high severity. The exploit is publicly disclosed and can be launched remotely by supplying a crafted url argument. EPSS information is not available and the vulnerability is not listed in CISA’s KEV catalog, yet the remote nature and lack of a validation guard make it a credible threat worth addressing promptly. Systems that can reach external networks from the API endpoint are at greatest risk.
OpenCVE Enrichment