| Title | DefaultFuction CRM V1.0.0 Server-Side Request Forgery |
|---|
| Description | A Server-Side Request Forgery (SSRF) vulnerability was identified in the Customer Relationship Management System. The issue occurs when the application fetches data from a remote URL based on a user-supplied parameter without proper validation or sanitization. An attacker can manipulate this parameter to make the server send crafted requests to unintended destinations. |
|---|
| Source | ⚠️ https://github.com/DefaultFuction/Jeson-Customer-Relationship-Management-System/issues/2 |
|---|
| User | Practice (UID 95611) |
|---|
| Submission | 03/09/2026 13:35 (22 days ago) |
|---|
| Moderation | 03/23/2026 07:08 (14 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 352482 [DefaultFuction Jeson-Customer-Relationship-Management-System up to 1b4679c4d06b90d31dd521c2b000bfdec5a36e00 API Module /api/System.php url server-side request forgery] |
|---|
| Points | 19 |
|---|