Back to VulnFeed / CVE-2026-7782
root@hackertop:~/vulnfeed/CVE-2026-7782#
CVE-2026-7782 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

CodeCanyon Perfex CRM up to 3.4.1 Tenant Clients.php Clients::project ID authorization

Perfex CRM 16d ago Impact pending confirmation
LIFECYCLE
5.7 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in CodeCanyon Perfex CRM up to 3.4.1 (Customer Relationship Management System). It has been declared as critical. Affected by this vulnerability is the function Clients::project of the file application/controllers/Clients.php of the component Tenant Handler. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument id with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-639. The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Exploit: It is possible to download the exploit at bytium.com. It is declared as proof-of-concept. By approaching the search of inurl:application/controllers/Clients.php it is possible to find vulnerable targets with Google Hacking.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7782 · CVSS 5.7 · Active Threat