CVE-2026-3616
DefaultFuction Jeson Customer Relationship Management System edit.php sql injection
CVSS Score
6.3
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was detected in DefaultFuction Jeson Customer Relationship Management System 1.0.0. Impacted is an unknown function of the file /modules/customers/edit.php. Performing a manipulation of the argument ID results in sql injection. The attack may be initiated remotely. The exploit is now public and may be used. The patch is named f0e991870e9d33701cca3a1d0fd4eec135af01a6. It is suggested to install a patch to address this issue.
| CWE | CWE-89 CWE-74 |
| Vendor | defaultfuction |
| Product | jeson customer relationship management system |
| Published | Mar 6, 2026 |
| Last Updated | Mar 9, 2026 |
Stay Ahead of the Next One
Get instant alerts for defaultfuction jeson customer relationship management system
Be the first to know when new medium vulnerabilities affecting defaultfuction jeson customer relationship management system are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
DefaultFuction / Jeson Customer Relationship Management System
1.0.0
References
vuldb.com: https://vuldb.com/?id.349234 vuldb.com: https://vuldb.com/?ctiid.349234 vuldb.com: https://vuldb.com/?submit.765096 github.com: https://github.com/DefaultFuction/Jeson-Customer-Relationship-Management-System/issues/1 github.com: https://github.com/DefaultFuction/Jeson-Customer-Relationship-Management-System/issues/1#issuecomment-3982939567 github.com: https://github.com/DefaultFuction/Jeson-Customer-Relationship-Management-System/issues/1#issue-3972001812 github.com: https://github.com/DefaultFuction/Jeson-Customer-Relationship-Management-System/commit/f0e991870e9d33701cca3a1d0fd4eec135af01a6
Credits
๐ Practice (VulDB User)