Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3265: Improper Authorization in go2ismail Free-CRM

0
Medium
VulnerabilityCVE-2026-3265cvecve-2026-3265
Published: Thu Feb 26 2026 (02/26/2026, 22:32:08 UTC)
Source: CVE Database V5
Vendor/Project: go2ismail
Product: Free-CRM

Description

CVE-2026-3265 is an improper authorization vulnerability in the Security API component of go2ismail Free-CRM, allowing remote attackers to bypass authorization controls. The vulnerability affects versions up to commit b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1. Exploitation requires no user interaction and can be performed remotely with low attack complexity but requires low-level privileges. The vulnerability could lead to unauthorized access or actions within the CRM system, impacting confidentiality, integrity, and availability to a limited extent. The vendor has not responded to disclosure attempts, and no patches are currently available. The CVSS 4. 0 base score is 5. 3, indicating medium severity. Organizations using this CRM should implement compensating controls and monitor for suspicious activity until a fix is released.

AI-Powered Analysis

AILast updated: 02/26/2026, 23:13:09 UTC

Technical Analysis

CVE-2026-3265 identifies an improper authorization vulnerability in the go2ismail Free-CRM product, specifically within an unspecified part of the /api/Security/ endpoint of the Security API component. This flaw allows an attacker to bypass authorization checks remotely, potentially enabling unauthorized access or actions within the CRM system. The vulnerability affects all versions up to the commit b83c40a90726d5e58f0cc680ffdcaa28a03fb5d1, but due to the product's rolling release strategy, exact versioning details are unclear. The attack vector is network-based with low complexity and does not require user interaction, but it does require the attacker to have low-level privileges (PR:L). The impact on confidentiality, integrity, and availability is limited but present, as unauthorized actions could compromise sensitive customer data or disrupt CRM operations. The vendor was contacted early but did not respond or provide a patch, and no official remediation is currently available. Public exploit code exists, increasing the risk of exploitation. The CVSS 4.0 score of 5.3 reflects a medium severity level, balancing the ease of exploitation with the limited scope of impact. Organizations using go2ismail Free-CRM should be aware of this vulnerability and take immediate steps to mitigate risk while awaiting an official fix.

Potential Impact

The improper authorization vulnerability in go2ismail Free-CRM can lead to unauthorized access or manipulation of CRM data and functions. This can compromise the confidentiality of sensitive customer information, affect data integrity by allowing unauthorized changes, and potentially disrupt availability if critical security functions are bypassed. Organizations relying on this CRM for customer relationship management may face data breaches, loss of customer trust, regulatory compliance issues, and operational disruptions. Since the exploit is publicly available and the vendor has not issued a patch, the risk of exploitation is elevated. Attackers with low-level privileges could escalate their access or perform unauthorized actions remotely without user interaction, increasing the threat landscape. The medium severity rating indicates a moderate but significant risk, especially for organizations handling sensitive or regulated data.

Mitigation Recommendations

1. Implement strict network segmentation and firewall rules to restrict access to the /api/Security/ endpoint to trusted internal systems only. 2. Employ strong authentication and authorization mechanisms at the network perimeter and within the application to limit low-privilege user capabilities. 3. Monitor logs and network traffic for unusual or unauthorized API calls targeting the Security API endpoints. 4. Use Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts against the vulnerable API paths. 5. Temporarily disable or restrict access to the affected API endpoints if feasible until a patch is released. 6. Conduct regular security audits and penetration tests focusing on authorization controls within the CRM. 7. Maintain up-to-date backups of CRM data to enable recovery in case of compromise. 8. Engage with the vendor or community to track patch releases or updates addressing this vulnerability. 9. Educate internal users about the risk and signs of exploitation to enhance detection capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-26T14:43:40.989Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0cf8b32ffcdb8a25ff606

Added to database: 2/26/2026, 10:56:11 PM

Last enriched: 2/26/2026, 11:13:09 PM

Last updated: 2/26/2026, 11:59:01 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses