Back to VulnFeed / CVE-2026-7783
root@hackertop:~/vulnfeed/CVE-2026-7783#
CVE-2026-7783 MEDIUM SQLi/Injection ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

CodeCanyon Perfex CRM up to 3.4.1 Admin Kanban Endpoint AbstractKanban.php applySortQuery this sql injection

Perfex CRM 16d ago Impact pending confirmation
LIFECYCLE
5.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in CodeCanyon Perfex CRM up to 3.4.1 (Customer Relationship Management System). It has been rated as critical. Affected by this issue is the function AbstractKanban::applySortQuery of the file application/services/AbstractKanban.php of the component Admin Kanban Endpoint. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument this with an unknown input leads to a unknown weakness. Using CWE to declare the problem leads to CWE-89. The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.

Impact: Impacted is confidentiality, integrity, and availability.

Exploit: The exploit is available at bytium.com. It is declared as proof-of-concept. By approaching the search of inurl:application/services/AbstractKanban.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7783 · CVSS 5.7 · Active Threat