Vulnerability Description
A weakness has been identified in CRMEB up to 5.6.3. The impacted element is the function remoteRegister of the file crmeb/app/services/user/LoginServices.php of the component JSON Token Handler. Executing a manipulation of the argument uid can lead to improper authentication. The attack may be performed from remote. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Crmeb | Crmeb | <= 5.6.3 |
Related Weaknesses (CWE)
References
- https://github.com/foeCat/CVE/blob/main/CRMEB/jwt_auth_bypass/remote_register_jwExploitMitigationThird Party Advisory
- https://vuldb.com/?ctiid.341789Permissions RequiredVDB Entry
- https://vuldb.com/?id.341789Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.735349Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-1203?
CVE-2026-1203 is a vulnerability with a CVSS score of 5.6 (MEDIUM). A weakness has been identified in CRMEB up to 5.6.3. The impacted element is the function remoteRegister of the file crmeb/app/services/user/LoginServices.php of the component JSON Token Handler. Exec...
How severe is CVE-2026-1203?
CVE-2026-1203 has been rated MEDIUM with a CVSS base score of 5.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-1203?
Check the references section above for vendor advisories and patch information. Affected products include: Crmeb Crmeb.