Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 06:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 17:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Crmeb
Crmeb crmeb |
|
| Vendors & Products |
Crmeb
Crmeb crmeb |
Tue, 20 Jan 2026 10:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in CRMEB up to 5.6.3. The impacted element is the function remoteRegister of the file crmeb/app/services/user/LoginServices.php of the component JSON Token Handler. Executing a manipulation of the argument uid can lead to improper authentication. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | CRMEB JSON Token LoginServices.php remoteRegister improper authentication | |
| Weaknesses | CWE-287 | |
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-01-20T21:10:40.814Z
Reserved: 2026-01-19T15:27:54.847Z
Link: CVE-2026-1203
Updated: 2026-01-20T21:10:32.028Z
Status : Received
Published: 2026-01-20T01:15:56.977
Modified: 2026-01-20T01:15:56.977
Link: CVE-2026-1203
No data.
OpenCVE Enrichment
Updated: 2026-01-20T17:39:52Z