๐Ÿ” CVE Alert

CVE-2026-31845

CRITICAL 9.3
CVSS Score
9.3
EPSS Score
0.0%
EPSS Percentile
5th

A reflected cross-site scripting (XSS) vulnerability exists in Rukovoditel CRM version 3.6.4 and earlier in the Zadarma telephony API endpoint (/api/tel/zadarma.php). The application directly reflects user-supplied input from the 'zd_echo' GET parameter into the HTTP response without proper sanitization, output encoding, or content-type restrictions. The vulnerable code is: if (isset($_GET['zd_echo'])) exit($_GET['zd_echo']); An unauthenticated attacker can exploit this issue by crafting a malicious URL containing JavaScript payloads. When a victim visits the link, the payload executes in the context of the application within the victim's browser, potentially leading to session hijacking, credential theft, phishing, or account takeover. The issue is fixed in version 3.7, which introduces proper input validation and output encoding to prevent script injection.

CWE CWE-79
Vendor rukovoditel
Product rukovoditel crm
Published Apr 11, 2026
Last Updated Apr 13, 2026
Stay Ahead of the Next One

Get instant alerts for rukovoditel rukovoditel crm

Be the first to know when new critical vulnerabilities affecting rukovoditel rukovoditel crm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None

Affected Versions

Rukovoditel / Rukovoditel CRM
3.6.4

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
forum.rukovoditel.net: https://forum.rukovoditel.net/viewtopic.php?p=22499#p22499

Credits

Shukrullo Raximov (Mothra)