Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3616: SQL Injection in DefaultFuction Jeson Customer Relationship Management System

0
Medium
VulnerabilityCVE-2026-3616cvecve-2026-3616
Published: Fri Mar 06 2026 (03/06/2026, 01:32:08 UTC)
Source: CVE Database V5
Vendor/Project: DefaultFuction
Product: Jeson Customer Relationship Management System

Description

CVE-2026-3616 is a medium severity SQL injection vulnerability found in DefaultFuction Jeson Customer Relationship Management System version 1. 0. 0. The flaw exists in the /modules/customers/edit. php file where manipulation of the ID parameter allows remote attackers to execute arbitrary SQL commands. No authentication or user interaction is required, and the vulnerability can be exploited over the network. Although no known exploits are currently in the wild, a public exploit has been released. The vulnerability impacts confidentiality, integrity, and availability of the CRM database. A patch identified by commit f0e991870e9d33701cca3a1d0fd4eec135af01a6 is available and should be applied promptly. Organizations using this CRM version are advised to update immediately to prevent potential data breaches or system compromise.

AI-Powered Analysis

AILast updated: 03/06/2026, 02:45:19 UTC

Technical Analysis

CVE-2026-3616 is a SQL injection vulnerability discovered in DefaultFuction Jeson Customer Relationship Management System version 1.0.0. The vulnerability resides in the /modules/customers/edit.php file, specifically in an unknown function that processes the 'ID' parameter. By manipulating this parameter, an attacker can inject malicious SQL code, potentially allowing unauthorized access to or modification of the underlying database. The attack vector is remote network access without requiring authentication or user interaction, increasing the risk of exploitation. The vulnerability affects the confidentiality, integrity, and availability of the CRM data, as attackers could extract sensitive customer information, alter records, or disrupt service. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the ease of exploitation and the moderate impact. Although no exploits are currently observed in the wild, a public exploit is available, raising the urgency for patching. The vendor has released a patch identified by commit f0e991870e9d33701cca3a1d0fd4eec135af01a6, which addresses the issue by properly sanitizing or parameterizing the input to prevent SQL injection. Organizations using this CRM should prioritize applying this patch and review their systems for signs of compromise.

Potential Impact

The SQL injection vulnerability allows remote attackers to execute arbitrary SQL commands on the backend database without authentication, potentially leading to unauthorized data disclosure, data manipulation, or denial of service. Confidential customer data stored in the CRM could be exposed or altered, undermining trust and compliance with data protection regulations. Attackers could also disrupt CRM operations, affecting business continuity. The medium severity rating indicates a moderate risk, but the availability of a public exploit increases the likelihood of attacks. Organizations relying on this CRM system face risks of data breaches, reputational damage, and operational disruptions if unpatched. The vulnerability could be leveraged as an initial foothold for further network compromise, especially if the CRM is integrated with other critical systems.

Mitigation Recommendations

1. Immediately apply the official patch identified by commit f0e991870e9d33701cca3a1d0fd4eec135af01a6 to all affected Jeson CRM 1.0.0 instances. 2. If patching is temporarily not possible, implement web application firewall (WAF) rules to detect and block SQL injection attempts targeting the 'ID' parameter in /modules/customers/edit.php. 3. Conduct thorough input validation and parameterized queries in all custom code interacting with the database to prevent injection flaws. 4. Perform security audits and penetration testing focused on injection vulnerabilities in the CRM environment. 5. Monitor logs for suspicious database queries or unusual access patterns indicative of exploitation attempts. 6. Restrict network access to the CRM system to trusted IPs and enforce least privilege principles on database accounts used by the CRM. 7. Educate development and operations teams on secure coding practices to avoid similar vulnerabilities in future releases.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-03-05T18:42:24.952Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa3c78c48b3f10ffcfb821

Added to database: 3/6/2026, 2:31:20 AM

Last enriched: 3/6/2026, 2:45:19 AM

Last updated: 3/6/2026, 3:39:44 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses