CVE-2021-40303: n/a in n/a
perfex crm 1.10 is vulnerable to Cross Site Scripting (XSS) via /clients/profile.
AI Analysis
Technical Summary
CVE-2021-40303 is a Cross Site Scripting (XSS) vulnerability identified in Perfex CRM version 1.10, specifically exploitable via the /clients/profile endpoint. Perfex CRM is a customer relationship management software used by various organizations to manage client interactions and data. The vulnerability arises due to insufficient input sanitization or output encoding on user-supplied data within the client profile page, allowing an attacker to inject malicious scripts. When a victim accesses the compromised profile page, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be launched remotely over the network, requires low attack complexity, needs privileges (authenticated user), and user interaction (victim must visit the malicious link). The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known in the wild, and no official patches or vendor advisories have been linked, which suggests limited exploitation but also a lack of formal remediation guidance. The CWE-79 classification confirms this is a classic reflected or stored XSS issue, a common web application security flaw.
Potential Impact
For European organizations using Perfex CRM 1.10, this vulnerability poses a risk primarily to the confidentiality and integrity of client data and user sessions. Successful exploitation could allow attackers to hijack user sessions, steal sensitive client information, or perform unauthorized actions within the CRM under the guise of legitimate users. This can lead to data breaches, reputational damage, and potential regulatory non-compliance under GDPR due to exposure of personal data. Since the vulnerability requires authenticated access and user interaction, the threat is somewhat mitigated by internal controls but remains significant in environments with many users or where phishing/social engineering can be leveraged. The CRM’s role in managing client relationships means that any compromise could disrupt business operations and client trust. Additionally, the scope of impact could extend to connected systems if the CRM integrates with other enterprise applications. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value client data such as finance, legal, or healthcare within Europe.
Mitigation Recommendations
1. Immediate mitigation should focus on implementing strict input validation and output encoding on the /clients/profile endpoint to neutralize malicious scripts. This can be done by applying standard web security libraries or frameworks that automatically handle encoding. 2. Restrict access to the CRM system to trusted users and networks, employing network segmentation and VPNs to reduce exposure. 3. Enforce multi-factor authentication (MFA) to reduce the risk of compromised credentials being leveraged to exploit the vulnerability. 4. Conduct user awareness training to reduce the risk of social engineering attacks that could trick users into clicking malicious links. 5. Monitor web application logs for unusual input patterns or repeated attempts to inject scripts. 6. If possible, upgrade to a newer, patched version of Perfex CRM once available or apply community-supplied patches or workarounds. 7. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. 8. Regularly audit and test the CRM application for other XSS or injection vulnerabilities to ensure comprehensive security.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2021-40303: n/a in n/a
Description
perfex crm 1.10 is vulnerable to Cross Site Scripting (XSS) via /clients/profile.
AI-Powered Analysis
Technical Analysis
CVE-2021-40303 is a Cross Site Scripting (XSS) vulnerability identified in Perfex CRM version 1.10, specifically exploitable via the /clients/profile endpoint. Perfex CRM is a customer relationship management software used by various organizations to manage client interactions and data. The vulnerability arises due to insufficient input sanitization or output encoding on user-supplied data within the client profile page, allowing an attacker to inject malicious scripts. When a victim accesses the compromised profile page, the injected script executes in the context of the victim's browser, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 3.1 base score is 5.4, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N) reveals that the attack can be launched remotely over the network, requires low attack complexity, needs privileges (authenticated user), and user interaction (victim must visit the malicious link). The vulnerability impacts confidentiality and integrity but does not affect availability. No public exploits are currently known in the wild, and no official patches or vendor advisories have been linked, which suggests limited exploitation but also a lack of formal remediation guidance. The CWE-79 classification confirms this is a classic reflected or stored XSS issue, a common web application security flaw.
Potential Impact
For European organizations using Perfex CRM 1.10, this vulnerability poses a risk primarily to the confidentiality and integrity of client data and user sessions. Successful exploitation could allow attackers to hijack user sessions, steal sensitive client information, or perform unauthorized actions within the CRM under the guise of legitimate users. This can lead to data breaches, reputational damage, and potential regulatory non-compliance under GDPR due to exposure of personal data. Since the vulnerability requires authenticated access and user interaction, the threat is somewhat mitigated by internal controls but remains significant in environments with many users or where phishing/social engineering can be leveraged. The CRM’s role in managing client relationships means that any compromise could disrupt business operations and client trust. Additionally, the scope of impact could extend to connected systems if the CRM integrates with other enterprise applications. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks, especially in sectors with high-value client data such as finance, legal, or healthcare within Europe.
Mitigation Recommendations
1. Immediate mitigation should focus on implementing strict input validation and output encoding on the /clients/profile endpoint to neutralize malicious scripts. This can be done by applying standard web security libraries or frameworks that automatically handle encoding. 2. Restrict access to the CRM system to trusted users and networks, employing network segmentation and VPNs to reduce exposure. 3. Enforce multi-factor authentication (MFA) to reduce the risk of compromised credentials being leveraged to exploit the vulnerability. 4. Conduct user awareness training to reduce the risk of social engineering attacks that could trick users into clicking malicious links. 5. Monitor web application logs for unusual input patterns or repeated attempts to inject scripts. 6. If possible, upgrade to a newer, patched version of Perfex CRM once available or apply community-supplied patches or workarounds. 7. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. 8. Regularly audit and test the CRM application for other XSS or injection vulnerabilities to ensure comprehensive security.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2021-08-30T00:00:00.000Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9839c4522896dcbec9e9
Added to database: 5/21/2025, 9:09:13 AM
Last enriched: 6/25/2025, 8:43:57 PM
Last updated: 8/7/2025, 12:43:45 PM
Views: 13
Related Threats
CVE-2025-8604: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wptb WP Table Builder – WordPress Table Plugin
MediumCVE-2025-9016: Uncontrolled Search Path in Mechrevo Control Center GX V2
HighCVE-2025-8451: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpdevteam Essential Addons for Elementor – Popular Elementor Templates & Widgets
MediumCVE-2025-8013: CWE-918 Server-Side Request Forgery (SSRF) in quttera Quttera Web Malware Scanner
LowCVE-2025-6679: CWE-434 Unrestricted Upload of File with Dangerous Type in bitpressadmin Bit Form – Custom Contact Form, Multi Step, Conversational, Payment & Quiz Form builder
CriticalActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.