CVE-2026-31845

Rukovoditel · CRM

A reflected XSS vulnerability in the Rukovoditel CRM Zadarma telephony API allows unauthenticated attackers to execute malicious scripts.

Executive summary

An unauthenticated reflected cross-site scripting (XSS) vulnerability in Rukovoditel CRM poses a high risk of session hijacking and credential theft.

Vulnerability

The Zadarma telephony API endpoint (/api/tel/zadarma.php) fails to sanitize the zd_echo GET parameter, allowing an unauthenticated attacker to inject arbitrary JavaScript that executes in the victim's browser.

Business impact

With a CVSS score of 9.3, this vulnerability is critical. Attackers can exploit this to perform session hijacking, phishing attacks, or account takeovers, potentially leading to unauthorized access to sensitive CRM data and significant reputational damage.

Remediation

Immediate Action: Upgrade Rukovoditel CRM to version 3.7 or later.

Proactive Monitoring: Review web server logs for suspicious requests to the Zadarma API endpoint containing script-like patterns.

Compensating Controls: Deploy a WAF with rules configured to detect and block reflected XSS attempts in URL parameters.

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the high CVSS score and the nature of XSS, organizations should prioritize upgrading to version 3.7 immediately to eliminate the injection vector.