CVE-2026-2141
Awaiting Analysis Awaiting Analysis - Queue
Improper Authorization in WukongCRM URL Handler Allows Remote Exploit

Publication date: 2026-02-08

Last updated on: 2026-04-29

Assigner: VulDB

Description
A security flaw has been discovered in WuKongOpenSource WukongCRM up to 11.3.3. This affects an unknown part of the file gateway/src/main/java/com/kakarote/gateway/service/impl/PermissionServiceImpl.java of the component URL Handler. Performing a manipulation results in improper authorization. Remote exploitation of the attack is possible. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-02-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
5kcrm wukongcrm From 11.0 (inc) to 11.3.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
CWE-863 The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': 'CVE-2026-2141 is a critical improper authorization vulnerability in WuKongOpenSource WukongCRM versions up to 11.3.3. It exists in the URL Handler component, specifically in the PermissionServiceImpl.java file. The flaw is due to incorrect or missing authorization checks, allowing unauthorized users to bypass authentication mechanisms.'}, {'type': 'paragraph', 'content': "Attackers can manipulate URL paths to bypass gateway authentication, gaining full permissions within the web system. This enables them to query user lists, retrieve user IDs, and reset any user's password without proper authorization."}, {'type': 'paragraph', 'content': 'The vulnerability can be exploited remotely via crafted HTTP POST requests to specific endpoints, and a public proof-of-concept exploit is available. The vendor was notified but has not responded or provided a fix.'}] [1, 2, 3]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': 'This vulnerability allows attackers to gain unauthorized access to the WukongCRM system with full permissions.'}, {'type': 'list_item', 'content': 'Attackers can query sensitive user information, including user lists and IDs.'}, {'type': 'list_item', 'content': "Attackers can arbitrarily reset any user's password, potentially taking over user accounts."}, {'type': 'list_item', 'content': 'Attackers can perform unauthorized data operations such as addition, deletion, modification, and querying.'}, {'type': 'list_item', 'content': "The system's confidentiality, integrity, and availability can be compromised."}, {'type': 'list_item', 'content': 'Potential system crashes may occur due to exploitation.'}] [1, 2, 3]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability can be detected by attempting to exploit the improper authorization flaw via HTTP POST requests to specific endpoints that should require authentication.'}, {'type': 'list_item', 'content': 'Send an unauthorized POST request to `/adminUser/queryUserList///;name=/v2/api-docs` with a JSON payload like `{ "page": 1, "limit": 10 }` to check if user information is returned without proper authorization.'}, {'type': 'list_item', 'content': 'Send an unauthorized POST request to `/adminUser/resetPassword///;name=/v2/api-docs` with a JSON payload containing user IDs and a new password to test if password reset is possible without authentication.'}, {'type': 'paragraph', 'content': 'If these requests succeed without proper credentials, it indicates the presence of the vulnerability.'}] [3]


What immediate steps should I take to mitigate this vulnerability?

There are no official patches or vendor-provided mitigations available for this vulnerability as of the last update.

Immediate mitigation steps include:

  • Restrict access to the affected WukongCRM system, especially the URL Handler component, by limiting network exposure and applying strict firewall rules.
  • Monitor and block suspicious HTTP requests that attempt to exploit URL path manipulations such as appending sequences like `/adminUser/queryUserList///;name=/v2/api-docs` or `/adminUser/resetPassword///;name=/v2/api-docs`.
  • Consider replacing or upgrading the affected component or product to a version that is not vulnerable, if available.

Due to the severity and ease of exploitation, proactive network monitoring and access control are critical until a patch or fix is released.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart