JustAppSec
Back to news

Reflected XSS in Rukovoditel CRM enables session compromise

2 min readPublished 11 Apr 2026Updated 11 Apr 2026Source: CVEProject (cvelistV5)

TL;DR — An unauthenticated reflected XSS in Rukovoditel CRM’s Zadarma endpoint can execute attacker-controlled JavaScript in a victim’s session when they open a crafted link.

What happened

Rukovoditel CRM is a web-based customer relationship management application. CVE-2026-31845 describes a reflected cross-site scripting (XSS) vulnerability in the Zadarma telephony API endpoint /_api/tel/zadarma.php, where the application reflects the zd_echo GET parameter directly into the HTTP response without proper output encoding.

Per the CVE record, exploitation is unauthenticated and requires user interaction (a victim visiting an attacker-crafted URL), enabling typical XSS outcomes such as session hijacking, credential theft, phishing, or account takeover.

ItemSource value
Affected softwareRukovoditel CRM
Vulnerable endpoint/api/tel/zadarma.php
Vulnerable parameterzd_echo (GET)
WeaknessCWE-79 (Reflected XSS)
SeverityCVSS v3.1 9.3 (Critical) (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N)
Affected versions3.6.4 (and earlier, per description)
Unaffected version (source)3.7

XSS in business apps remains a high-leverage issue because these systems often sit on identity-bearing sessions (support/admin workflows) and hold sensitive customer data; a single click can be enough to pivot into broader compromise.

Who is impacted

  • Deployments running Rukovoditel CRM version 3.6.4 (the CVE record states the issue exists in 3.6.4 and earlier).
  • Instances that expose the Zadarma integration endpoint /_api/tel/zadarma.php to users who could be targeted with crafted links.
  • Organizations where Rukovoditel sessions have access to high-value data (customer records, notes, attachments) or privileged administrative actions that can be triggered from an authenticated browser session.

What to do now

  • Follow vendor remediation guidance and apply the fixed release referenced by the CVE record (the record lists 3.7 as unaffected).
  • Inventory where Rukovoditel CRM is deployed and confirm running versions (VM images, containers, and deployed artifacts), focusing on internet- or partner-exposed instances.
  • Until updates are applied, reduce exposure of the vulnerable route where feasible (e.g., restrict access to /api/tel/zadarma.php to trusted networks) and monitor for suspicious requests containing zd_echo= payloads.
  • If you suspect exploitation, treat this as potential session compromise: review authentication logs and rotate credentials/tokens that could be exposed via an authenticated browser session.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.