Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24595: Missing Authorization in zohocrm Zoho CRM Lead Magnet

0
Medium
VulnerabilityCVE-2026-24595cvecve-2026-24595
Published: Fri Jan 23 2026 (01/23/2026, 14:29:01 UTC)
Source: CVE Database V5
Vendor/Project: zohocrm
Product: Zoho CRM Lead Magnet

Description

Missing Authorization vulnerability in zohocrm Zoho CRM Lead Magnet zoho-crm-forms allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Zoho CRM Lead Magnet: from n/a through <= 1.8.1.5.

AI-Powered Analysis

AILast updated: 01/23/2026, 15:23:45 UTC

Technical Analysis

CVE-2026-24595 is a Missing Authorization vulnerability identified in the Zoho CRM Lead Magnet product, specifically affecting versions up to and including 1.8.1.5. This vulnerability stems from improperly configured access control mechanisms within the zoho-crm-forms component, which allows users with limited privileges (PR:L) to perform actions or access data beyond their authorization scope. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The CVSS 3.1 vector indicates low attack complexity (AC:L) and an unchanged scope (S:U), meaning the impact is confined to the vulnerable component. The primary impacts are on confidentiality and integrity, potentially allowing unauthorized disclosure or modification of CRM lead data. There is no impact on availability. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability was published on January 23, 2026, by Patchstack. The lack of CWE identifiers suggests the issue is specifically related to access control misconfigurations rather than a broader class of vulnerabilities. Organizations using Zoho CRM Lead Magnet should prioritize reviewing their access control policies and configurations to prevent unauthorized access or data manipulation.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized access to sensitive customer relationship management data, including lead information, which could lead to data leakage or unauthorized data modification. This can undermine trust, violate data protection regulations such as GDPR, and potentially result in financial and reputational damage. Since Zoho CRM is widely used across various sectors including finance, retail, and professional services in Europe, the impact could be significant if exploited. The vulnerability does not affect system availability, so operational disruption is unlikely, but the confidentiality and integrity risks are notable. Organizations that rely heavily on Zoho CRM Lead Magnet for lead management and marketing automation are particularly at risk. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Immediately review and audit access control configurations within Zoho CRM Lead Magnet, focusing on the zoho-crm-forms component to ensure that privilege levels are correctly enforced. 2. Restrict permissions to the minimum necessary for users interacting with lead magnet forms and related data. 3. Monitor logs for unusual access patterns or unauthorized attempts to access or modify lead data. 4. Implement network segmentation and firewall rules to limit access to the CRM system to trusted users and networks. 5. Stay alert for official patches or updates from Zoho and apply them promptly once available. 6. Conduct regular security assessments and penetration testing focused on access control mechanisms within CRM systems. 7. Educate administrators and users about the importance of adhering to the principle of least privilege and secure configuration practices. 8. Consider deploying additional security controls such as Web Application Firewalls (WAF) to detect and block unauthorized access attempts targeting this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-23T12:32:12.343Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69738ade4623b1157c48bbf3

Added to database: 1/23/2026, 2:51:10 PM

Last enriched: 1/23/2026, 3:23:45 PM

Last updated: 2/7/2026, 7:27:00 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats