CVE-2026-31845
Rukovoditel · CRM
A reflected XSS vulnerability in the Rukovoditel CRM Zadarma telephony API allows unauthenticated attackers to execute malicious scripts.
Executive summary
An unauthenticated reflected cross-site scripting (XSS) vulnerability in Rukovoditel CRM poses a high risk of session hijacking and credential theft.
Vulnerability
The Zadarma telephony API endpoint (/api/tel/zadarma.php) fails to sanitize the zd_echo GET parameter, allowing an unauthenticated attacker to inject arbitrary JavaScript that executes in the victim's browser.
Business impact
With a CVSS score of 9.3, this vulnerability is critical. Attackers can exploit this to perform session hijacking, phishing attacks, or account takeovers, potentially leading to unauthorized access to sensitive CRM data and significant reputational damage.
Remediation
Immediate Action: Upgrade Rukovoditel CRM to version 3.7 or later.
Proactive Monitoring: Review web server logs for suspicious requests to the Zadarma API endpoint containing script-like patterns.
Compensating Controls: Deploy a WAF with rules configured to detect and block reflected XSS attempts in URL parameters.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Given the high CVSS score and the nature of XSS, organizations should prioritize upgrading to version 3.7 immediately to eliminate the injection vector.