Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10389: Improper Authorization in CRMEB

0
Medium
VulnerabilityCVE-2025-10389cvecve-2025-10389
Published: Sun Sep 14 2025 (09/14/2025, 04:02:06 UTC)
Source: CVE Database V5
Product: CRMEB

Description

A security flaw has been discovered in CRMEB up to 5.6.1. Impacted is the function Save of the file app/services/system/admin/SystemAdminServices.php of the component Administrator Password Handler. Performing manipulation of the argument ID results in improper authorization. The attack may be initiated remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:41:09 UTC

Technical Analysis

CVE-2025-10389 is a medium-severity vulnerability affecting CRMEB versions up to 5.6.1, specifically in the Administrator Password Handler component. The flaw exists in the Save function within the file app/services/system/admin/SystemAdminServices.php. The vulnerability arises due to improper authorization checks when processing the argument ID, allowing an attacker to manipulate this parameter remotely without authentication or user interaction. This improper authorization can lead to unauthorized changes in administrator password settings or related administrative functions, potentially compromising the integrity and confidentiality of the system. The vulnerability does not require user interaction and can be exploited remotely, increasing its risk profile. Although the vendor was notified early, no patch or official response has been issued, and a public exploit has been released, increasing the likelihood of exploitation. The CVSS 4.0 base score is 5.3, reflecting medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and partial impact on confidentiality, integrity, and availability. The lack of vendor response and public exploit availability make this a significant concern for organizations using affected CRMEB versions.

Potential Impact

For European organizations using CRMEB 5.6.0 or 5.6.1, this vulnerability poses a tangible risk to administrative account security and overall system integrity. Unauthorized manipulation of administrator password handling could lead to privilege escalation or unauthorized administrative access, potentially allowing attackers to alter critical system configurations, access sensitive customer data, or disrupt business operations. Given CRMEB's role as a CRM platform, exploitation could compromise customer relationship data, impacting confidentiality and trust. The remote and unauthenticated nature of the exploit increases the threat, especially for organizations exposing CRMEB services to the internet. The absence of a vendor patch means organizations must rely on mitigation strategies to reduce exposure. This vulnerability could also facilitate lateral movement within networks if attackers gain administrative control, increasing the risk of broader compromise. The medium severity score indicates moderate impact, but the real-world risk is elevated by public exploit availability and lack of vendor remediation.

Mitigation Recommendations

European organizations should immediately audit their CRMEB installations to identify affected versions (5.6.0 and 5.6.1). As no official patch is available, organizations should implement compensating controls such as restricting network access to CRMEB administrative interfaces via firewalls or VPNs to limit exposure to trusted users only. Employ strict access control policies and monitor logs for suspicious activities related to administrator password changes or unauthorized access attempts. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block exploitation attempts targeting the vulnerable Save function. Organizations should also isolate CRMEB servers from critical infrastructure to contain potential breaches. Regular backups and incident response plans should be updated to prepare for possible exploitation. Finally, organizations should track vendor communications for any forthcoming patches and plan timely updates once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:45:40.144Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c640bd97607eadceed6251

Added to database: 9/14/2025, 4:12:45 AM

Last enriched: 9/22/2025, 12:41:09 AM

Last updated: 10/30/2025, 4:45:10 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats