Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2141: Improper Authorization in WuKongOpenSource WukongCRM

0
Medium
VulnerabilityCVE-2026-2141cvecve-2026-2141
Published: Sun Feb 08 2026 (02/08/2026, 07:32:06 UTC)
Source: CVE Database V5
Vendor/Project: WuKongOpenSource
Product: WukongCRM

Description

A security flaw has been discovered in WuKongOpenSource WukongCRM up to 11.3.3. This affects an unknown part of the file gateway/src/main/java/com/kakarote/gateway/service/impl/PermissionServiceImpl.java of the component URL Handler. Performing a manipulation results in improper authorization. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 21:33:54 UTC

Technical Analysis

CVE-2026-2141 identifies an improper authorization vulnerability in the WuKongOpenSource WukongCRM product, specifically affecting versions 11.3.0 through 11.3.3. The vulnerability resides in the URL Handler component, within the PermissionServiceImpl.java file. Improper authorization means that the system fails to correctly verify whether a user has the necessary permissions before allowing access to certain functions or data. This flaw can be exploited remotely without authentication or user interaction, allowing an attacker with limited privileges to escalate their access or perform unauthorized actions. The vulnerability was discovered in early 2026, and although the vendor was notified, no response or patch has been issued. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The exploit code has been publicly released, which increases the likelihood of exploitation in the wild, although no confirmed active exploitation has been reported yet. The lack of vendor response and patch availability means organizations must rely on alternative mitigations. The vulnerability affects the core permission checking mechanism, which is critical for enforcing access control policies in WukongCRM, a customer relationship management platform used by various organizations for managing customer data and business processes.

Potential Impact

The improper authorization vulnerability allows attackers to bypass permission checks remotely, potentially leading to unauthorized access to sensitive customer data, modification of CRM records, or disruption of business workflows. This can compromise confidentiality, integrity, and availability of CRM data. Organizations relying on WukongCRM for customer management, sales, and support operations may face data breaches, regulatory compliance violations, and operational disruptions. Since the exploit requires no user interaction and can be performed remotely, the attack surface is broad, especially in internet-facing deployments. The medium CVSS score reflects partial impact and some required privileges, but the public availability of exploit code increases the risk of widespread attacks. The absence of vendor patches exacerbates the threat, forcing organizations to implement compensating controls. The vulnerability could be leveraged by insider threats or external attackers who have limited access but seek privilege escalation or unauthorized data access. Overall, the impact is significant for organizations with sensitive customer data or critical business processes managed through WukongCRM.

Mitigation Recommendations

1. Implement strict network segmentation and firewall rules to restrict access to WukongCRM instances, limiting exposure to trusted internal networks only. 2. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the PermissionServiceImpl endpoints or unusual authorization patterns. 3. Monitor logs closely for anomalous access attempts or privilege escalation activities related to WukongCRM. 4. Restrict user privileges to the minimum necessary, enforcing the principle of least privilege to reduce the impact of compromised accounts. 5. If possible, disable or restrict access to the vulnerable URL Handler component until a patch is available. 6. Engage in active threat hunting for indicators of compromise related to this vulnerability. 7. Prepare for rapid patch deployment once the vendor releases an official fix. 8. Consider alternative CRM solutions or temporary migration if the risk is unacceptable and no patch timeline is provided. 9. Educate internal teams about the vulnerability and the importance of reporting suspicious CRM behavior immediately. 10. Use multi-factor authentication (MFA) to reduce the risk of account compromise that could be leveraged to exploit this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-06T21:06:36.285Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69884451f9fa50a62f927d80

Added to database: 2/8/2026, 8:07:45 AM

Last enriched: 2/23/2026, 9:33:54 PM

Last updated: 3/26/2026, 9:21:56 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses