CVE-2026-1733: Improper Authorization in Zhong Bang CRMEB
A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2026-1733 is an improper authorization vulnerability found in Zhong Bang's CRMEB product, specifically in versions 5.6.0 through 5.6.3. The flaw resides in the API endpoint /api/store_integral/order/detail/:uni within the detail/tidyOrder function. By manipulating the order_id argument, an attacker can bypass authorization controls and access order details that should be restricted. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges or user interaction are needed, and the impact is limited to confidentiality with low integrity and availability impact. The vendor was contacted but did not respond, and no official patch has been released. A public exploit is available, increasing the likelihood of exploitation. This vulnerability could lead to unauthorized disclosure of sensitive order information, potentially exposing customer data and business transaction details. The lack of vendor response and patch availability necessitates immediate attention from organizations using affected versions.
Potential Impact
The primary impact of CVE-2026-1733 is unauthorized disclosure of order-related data, which can include sensitive customer and transactional information. This can lead to privacy violations, loss of customer trust, and potential regulatory compliance issues, especially in jurisdictions with strict data protection laws. Attackers exploiting this vulnerability could gather intelligence on business operations or customer purchasing behavior. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have significant reputational and financial consequences. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. Organizations worldwide using Zhong Bang CRMEB in e-commerce or retail sectors are at risk, particularly those with high volumes of sensitive order data. The availability of a public exploit increases the risk of automated scanning and exploitation attempts.
Mitigation Recommendations
Organizations should immediately audit their CRMEB installations to identify affected versions (5.6.0 to 5.6.3). In the absence of an official patch, implement strict access control checks on the /api/store_integral/order/detail/:uni endpoint to ensure order_id parameters are validated against the requesting user's permissions. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting this endpoint, especially those with unusual or out-of-context order_id values. Monitor logs for anomalous access patterns or repeated attempts to access unauthorized order details. Restrict API access to trusted networks or authenticated users where possible, even if the vulnerability does not require authentication. Engage with Zhong Bang for updates or patches and plan for timely upgrades once available. Additionally, conduct security awareness training for developers and administrators to recognize and remediate improper authorization issues in custom or third-party applications.
Affected Countries
China, Taiwan, Singapore, Malaysia, Vietnam, Indonesia, United States, Australia
CVE-2026-1733: Improper Authorization in Zhong Bang CRMEB
Description
A vulnerability was identified in Zhong Bang CRMEB up to 5.6.3. This affects the function detail/tidyOrder of the file /api/store_integral/order/detail/:uni. The manipulation of the argument order_id leads to improper authorization. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-1733 is an improper authorization vulnerability found in Zhong Bang's CRMEB product, specifically in versions 5.6.0 through 5.6.3. The flaw resides in the API endpoint /api/store_integral/order/detail/:uni within the detail/tidyOrder function. By manipulating the order_id argument, an attacker can bypass authorization controls and access order details that should be restricted. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges or user interaction are needed, and the impact is limited to confidentiality with low integrity and availability impact. The vendor was contacted but did not respond, and no official patch has been released. A public exploit is available, increasing the likelihood of exploitation. This vulnerability could lead to unauthorized disclosure of sensitive order information, potentially exposing customer data and business transaction details. The lack of vendor response and patch availability necessitates immediate attention from organizations using affected versions.
Potential Impact
The primary impact of CVE-2026-1733 is unauthorized disclosure of order-related data, which can include sensitive customer and transactional information. This can lead to privacy violations, loss of customer trust, and potential regulatory compliance issues, especially in jurisdictions with strict data protection laws. Attackers exploiting this vulnerability could gather intelligence on business operations or customer purchasing behavior. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach alone can have significant reputational and financial consequences. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad. Organizations worldwide using Zhong Bang CRMEB in e-commerce or retail sectors are at risk, particularly those with high volumes of sensitive order data. The availability of a public exploit increases the risk of automated scanning and exploitation attempts.
Mitigation Recommendations
Organizations should immediately audit their CRMEB installations to identify affected versions (5.6.0 to 5.6.3). In the absence of an official patch, implement strict access control checks on the /api/store_integral/order/detail/:uni endpoint to ensure order_id parameters are validated against the requesting user's permissions. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting this endpoint, especially those with unusual or out-of-context order_id values. Monitor logs for anomalous access patterns or repeated attempts to access unauthorized order details. Restrict API access to trusted networks or authenticated users where possible, even if the vulnerability does not require authentication. Engage with Zhong Bang for updates or patches and plan for timely upgrades once available. Additionally, conduct security awareness training for developers and administrators to recognize and remediate improper authorization issues in custom or third-party applications.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-02-01T07:35:30.209Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 697fddf0ac06320222500779
Added to database: 2/1/2026, 11:12:48 PM
Last enriched: 2/23/2026, 9:53:51 PM
Last updated: 3/25/2026, 4:44:41 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.