Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25469: n/a

0
High
VulnerabilityCVE-2024-25469cvecve-2024-25469
Published: Fri Feb 23 2024 (02/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

SQL Injection vulnerability in CRMEB crmeb_java v.1.3.4 and before allows a remote attacker to obtain sensitive information via the latitude and longitude parameters in the api/front/store/list component.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 10:38:17 UTC

Technical Analysis

CVE-2024-25469 is an SQL Injection vulnerability identified in CRMEB crmeb_java version 1.3.4 and earlier. The vulnerability arises from improper input validation and sanitization of the latitude and longitude parameters within the api/front/store/list API endpoint. An attacker can craft malicious input to manipulate the underlying SQL queries executed by the application, enabling unauthorized access to sensitive data stored in the backend database. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS v3.1 base score is 7.5, reflecting a high severity due to the potential for data confidentiality compromise without impacting integrity or availability. The vulnerability is categorized under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). No patches or fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. However, the presence of this vulnerability in a CRM platform that manages customer and business data could lead to significant data breaches if exploited. The lack of authentication requirements and the network accessibility of the vulnerable endpoint increase the risk profile. Organizations using CRMEB crmeb_java should monitor for updates and consider immediate mitigations to prevent exploitation.

Potential Impact

The primary impact of CVE-2024-25469 is the unauthorized disclosure of sensitive information stored within the CRMEB backend database. Attackers exploiting this SQL Injection vulnerability can extract confidential customer data, business intelligence, or other protected information, potentially leading to privacy violations, regulatory non-compliance, and reputational damage. Since the vulnerability does not affect data integrity or availability, the risk is focused on confidentiality breaches. The ease of exploitation—requiring no authentication or user interaction—means attackers can remotely target vulnerable systems at scale. Organizations relying on CRMEB crmeb_java for customer relationship management may face significant operational and legal consequences if sensitive data is leaked. Additionally, extracted data could be used for further attacks such as phishing or identity theft. The absence of known exploits in the wild suggests a window of opportunity for defenders to remediate before widespread exploitation occurs.

Mitigation Recommendations

1. Immediate mitigation should focus on input validation and sanitization: implement strict validation of latitude and longitude parameters to ensure only valid numeric values are accepted. 2. Employ parameterized queries or prepared statements in the api/front/store/list component to eliminate SQL Injection risks. 3. Monitor network traffic for anomalous requests targeting the vulnerable endpoint, especially those containing suspicious latitude and longitude values. 4. Restrict access to the vulnerable API endpoint through network-level controls such as firewalls or VPNs to limit exposure to trusted users or IP ranges. 5. Regularly audit and review application logs for signs of attempted exploitation. 6. Stay updated with CRMEB vendor advisories and apply official patches or updates as soon as they become available. 7. Consider deploying Web Application Firewalls (WAFs) with rules designed to detect and block SQL Injection attempts targeting the affected parameters. 8. Conduct security code reviews and penetration testing focusing on input handling in CRMEB components to identify and remediate similar vulnerabilities proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d68b7ef31ef0b571ef3

Added to database: 2/25/2026, 9:45:12 PM

Last enriched: 2/26/2026, 10:38:17 AM

Last updated: 4/12/2026, 3:40:35 PM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses