Skip to main content

CVE-2025-10390: Improper Authorization in CRMEB

Medium
VulnerabilityCVE-2025-10390cvecve-2025-10390
Published: Sun Sep 14 2025 (09/14/2025, 04:32:05 UTC)
Source: CVE Database V5
Product: CRMEB

Description

A weakness has been identified in CRMEB up to 5.6.1. The affected element is the function editAddress of the file app/services/user/UserAddressServices.php. Executing manipulation of the argument ID can lead to improper authorization. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/15/2025, 00:11:20 UTC

Technical Analysis

CVE-2025-10390 is a medium-severity vulnerability affecting CRMEB versions up to 5.6.1, specifically within the editAddress function located in the app/services/user/UserAddressServices.php file. The vulnerability arises due to improper authorization checks when handling the ID argument. An attacker can manipulate this ID parameter remotely to bypass authorization controls, potentially allowing unauthorized modification of user address data. The vulnerability does not require user interaction and can be exploited over the network with low attack complexity. The CVSS 4.0 vector indicates no privileges are required (PR:L means low privileges), no user interaction is needed, and the attack impacts confidentiality, integrity, and availability to a limited extent. Although the vendor was notified early, there has been no response or patch released at the time of disclosure. Public exploit code is available, increasing the risk of exploitation. The lack of a patch and vendor engagement means organizations using affected CRMEB versions remain exposed. CRMEB is a customer relationship management system, often used by businesses to manage client data and interactions, making the integrity and confidentiality of stored addresses critical. Improper authorization in this context could lead to unauthorized data modification, potentially facilitating fraud, data corruption, or further privilege escalation if combined with other vulnerabilities.

Potential Impact

For European organizations using CRMEB versions 5.6.0 or 5.6.1, this vulnerability poses a tangible risk to the confidentiality and integrity of customer data. Unauthorized modification of address information could lead to misdirected communications, fraudulent transactions, or reputational damage. In sectors such as finance, retail, or healthcare, where CRM data is tightly linked to sensitive personal information, the impact could extend to regulatory non-compliance under GDPR, resulting in legal and financial penalties. The remote exploitability and availability of public exploit code increase the likelihood of attacks, especially against organizations that have not applied mitigations or workarounds. While availability impact is limited, the integrity compromise could disrupt business operations and customer trust. The absence of vendor patches means organizations must rely on alternative mitigation strategies to reduce exposure.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement the following specific mitigations: 1) Conduct an immediate audit of CRMEB installations to identify affected versions (5.6.0 and 5.6.1). 2) Restrict network access to the CRMEB application, limiting it to trusted IP ranges and internal networks only, to reduce remote attack surface. 3) Implement web application firewall (WAF) rules to detect and block suspicious requests manipulating the ID parameter in the editAddress function. 4) Enforce strict access controls and monitoring on user address modification functions, including logging and alerting on anomalous changes. 5) Where possible, apply custom authorization checks at the application or database layer to validate user permissions before processing address edits. 6) Prepare for an upgrade plan to a future patched version once available, and monitor vendor communications closely. 7) Educate internal teams about the vulnerability and encourage vigilance for unusual CRM activity. These targeted steps go beyond generic advice by focusing on access restriction, monitoring, and compensating controls specific to the vulnerability's exploitation vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:45:56.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a89

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/15/2025, 12:11:20 AM

Last updated: 9/15/2025, 3:28:43 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats