Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3264: Execution After Redirect in go2ismail Free-CRM

0
Medium
VulnerabilityCVE-2026-3264cvecve-2026-3264
Published: Thu Feb 26 2026 (02/26/2026, 22:02:07 UTC)
Source: CVE Database V5
Vendor/Project: go2ismail
Product: Free-CRM

Description

A vulnerability was determined in go2ismail Free-CRM up to b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1. Affected by this issue is some unknown functionality of the component Administrative Interface. Executing a manipulation can lead to execution after redirect. The attack can be executed remotely. The exploit has been publicly disclosed and may be utilized. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 02/26/2026, 22:42:27 UTC

Technical Analysis

CVE-2026-3264 is a vulnerability identified in the go2ismail Free-CRM product, specifically impacting an unknown functionality within the Administrative Interface. The issue involves execution after redirect, meaning that an attacker can manipulate the redirect logic to execute unauthorized code or commands remotely. The attack vector is network-based (AV:N), requires low attack complexity (AC:L), and does not require authentication (PR:L) or user interaction (UI:N). The vulnerability affects confidentiality, integrity, and availability at a low level (VC:L, VI:L, VA:L). The product uses a rolling release model, which obscures precise versioning information, making it difficult to determine all affected releases or to track patches. The vendor was contacted but did not respond, and no official patches or mitigations have been published. Public exploit code has been disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported. The CVSS 4.0 base score is 5.3, reflecting a medium severity level. This vulnerability could allow attackers to bypass security controls in the administrative interface, potentially leading to unauthorized actions or data exposure within the CRM environment.

Potential Impact

The vulnerability could allow remote attackers to execute unauthorized code or commands within the administrative interface of go2ismail Free-CRM, potentially leading to unauthorized access to sensitive customer data, manipulation of CRM records, or disruption of CRM services. Although the impact on confidentiality, integrity, and availability is rated low individually, combined they could degrade trust in the CRM system and affect business operations relying on it. The lack of authentication requirement and user interaction increases the risk of automated exploitation. Organizations using this CRM system may face data breaches, operational disruptions, or compliance violations if exploited. The absence of vendor response and patches prolongs exposure, increasing the window of opportunity for attackers. Given the public disclosure of exploit code, the risk of exploitation may rise over time, especially in environments where the CRM is internet-facing or insufficiently segmented.

Mitigation Recommendations

Organizations should immediately audit their deployment of go2ismail Free-CRM to identify affected versions, despite the rolling release complexity. Network segmentation and restricting access to the administrative interface to trusted IP ranges can reduce exposure. Implementing web application firewalls (WAFs) with rules to detect and block suspicious redirect manipulations may provide interim protection. Monitoring logs for unusual redirect or execution patterns is critical to detect exploitation attempts early. Until an official patch is released, consider disabling or limiting administrative interface access where feasible. Engage with go2ismail support channels regularly to obtain updates or patches. Additionally, applying general security best practices such as enforcing strong access controls, multi-factor authentication on administrative accounts, and regular backups will help mitigate potential damage. Organizations should also prepare incident response plans specific to CRM compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T14:43:12.955Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0c89232ffcdb8a2524567

Added to database: 2/26/2026, 10:26:26 PM

Last enriched: 2/26/2026, 10:42:27 PM

Last updated: 2/26/2026, 11:33:19 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses