Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1734: Missing Authorization in Zhong Bang CRMEB

0
Medium
VulnerabilityCVE-2026-1734cvecve-2026-1734
Published: Sun Feb 01 2026 (02/01/2026, 23:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Zhong Bang
Product: CRMEB

Description

A security flaw has been discovered in Zhong Bang CRMEB up to 5.6.3. This vulnerability affects unknown code of the file crmeb/app/api/controller/v1/CrontabController.php of the component crontab Endpoint. The manipulation results in missing authorization. The attack can be launched remotely. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:54:10 UTC

Technical Analysis

CVE-2026-1734 identifies a missing authorization vulnerability in the Zhong Bang CRMEB product, specifically affecting versions 5.6.0 through 5.6.3. The vulnerability resides in the crontab API endpoint implemented in the file crmeb/app/api/controller/v1/CrontabController.php. Due to insufficient authorization checks, remote attackers can invoke this endpoint without any authentication or user interaction, enabling them to execute actions intended only for authorized users. The vulnerability is exploitable over the network with low attack complexity and no privileges required, as reflected in its CVSS 4.0 vector: AV:N/AC:L/PR:N/UI:N. The impact primarily affects the integrity of the system, as unauthorized manipulation of scheduled tasks or cron jobs could lead to execution of arbitrary commands or disruption of normal operations. The vendor was notified early but has not issued any response or patch, and while a public exploit exists, there are no confirmed reports of exploitation in the wild. This lack of vendor response and patch availability increases the urgency for organizations to implement compensating controls. The vulnerability does not affect confidentiality or availability directly but poses a significant risk to system integrity and operational security due to unauthorized access to critical backend functionality.

Potential Impact

The missing authorization vulnerability in CRMEB's crontab endpoint can allow attackers to remotely execute unauthorized commands or manipulate scheduled tasks, potentially leading to system compromise or disruption of business processes. Organizations relying on CRMEB for customer relationship management and task automation may face integrity breaches, unauthorized data manipulation, or service interruptions. Since the flaw requires no authentication and can be exploited remotely, it broadens the attack surface significantly. The absence of vendor patches and public availability of exploits increase the likelihood of exploitation attempts. This can result in unauthorized access to sensitive operational functions, possible lateral movement within networks, and damage to organizational reputation. The impact is particularly critical for organizations with high reliance on CRMEB for automated workflows or those operating in regulated industries where unauthorized changes can lead to compliance violations.

Mitigation Recommendations

1. Immediately restrict network access to the crontab API endpoint (crmeb/app/api/controller/v1/CrontabController.php) using firewalls or web application firewalls (WAF) to allow only trusted IP addresses or internal network segments. 2. Implement strict access control policies at the network perimeter to limit exposure of the CRMEB application to the internet. 3. Monitor logs for unusual or unauthorized access attempts to the crontab endpoint, focusing on anomalous API calls or unexpected task scheduling activities. 4. If possible, disable or remove the crontab API functionality temporarily until a vendor patch is available. 5. Employ application-layer authentication and authorization proxies to enforce access controls on vulnerable endpoints. 6. Regularly audit CRMEB configurations and user permissions to ensure no excessive privileges exist. 7. Stay alert for vendor updates or community patches and apply them promptly once released. 8. Consider isolating CRMEB instances in segmented network zones to reduce potential lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-01T07:35:34.969Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697fe4f8ac0632022254f721

Added to database: 2/1/2026, 11:42:48 PM

Last enriched: 2/23/2026, 9:54:10 PM

Last updated: 3/25/2026, 9:55:07 AM

Views: 125

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses