Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10390: Improper Authorization in CRMEB

0
Medium
VulnerabilityCVE-2025-10390cvecve-2025-10390
Published: Sun Sep 14 2025 (09/14/2025, 04:32:05 UTC)
Source: CVE Database V5
Product: CRMEB

Description

A weakness has been identified in CRMEB up to 5.6.1. The affected element is the function editAddress of the file app/services/user/UserAddressServices.php. Executing manipulation of the argument ID can lead to improper authorization. The attack may be launched remotely. The exploit has been made available to the public and could be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/22/2025, 00:41:20 UTC

Technical Analysis

CVE-2025-10390 is a medium-severity vulnerability affecting CRMEB versions up to 5.6.1, specifically within the editAddress function located in the app/services/user/UserAddressServices.php file. The vulnerability arises from improper authorization controls when manipulating the argument ID parameter. This flaw allows an attacker to remotely exploit the system by crafting requests that alter the ID argument, potentially enabling unauthorized modification of user address data. The vulnerability does not require user interaction and can be exploited over the network without authentication, though it requires low privileges (PR:L) indicating some level of access is needed. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects that the attack is network-based with low complexity, no user interaction, and partial impact on confidentiality, integrity, and availability. The vendor has not responded to the disclosure, and no official patches are currently available. Although no known exploits in the wild have been reported, public exploit code is available, increasing the risk of exploitation. This vulnerability could allow attackers to manipulate user address information, potentially leading to data integrity issues, unauthorized data disclosure, or further escalation depending on the CRMEB deployment context.

Potential Impact

For European organizations using CRMEB versions 5.6.0 or 5.6.1, this vulnerability poses a risk to the integrity and confidentiality of customer data managed within the CRM system. Unauthorized modification of address data could lead to fraudulent activities, misdirected communications, or compliance violations under GDPR due to inaccurate personal data handling. The ability to exploit this remotely without user interaction increases the threat surface, especially for organizations exposing CRMEB services to the internet or internal networks with insufficient segmentation. The lack of vendor response and absence of patches means organizations must rely on compensating controls to mitigate risk. If exploited, this vulnerability could undermine trust in customer data management processes and potentially facilitate further attacks leveraging compromised user information. The medium severity rating suggests a moderate but tangible risk that should be addressed promptly to avoid escalation.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement the following specific mitigations: 1) Restrict network access to CRMEB services, limiting exposure to trusted internal networks and VPNs only. 2) Implement strict access controls and monitoring on the editAddress function usage, including logging and anomaly detection for unusual ID parameter manipulations. 3) Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the editAddress endpoint, especially those attempting to manipulate ID parameters. 4) Conduct thorough code reviews and, if feasible, apply temporary code-level fixes or input validation to enforce proper authorization checks on the ID argument. 5) Educate administrators and users about the vulnerability and encourage prompt reporting of suspicious activity. 6) Monitor threat intelligence feeds for any emerging exploits or vendor patches to apply updates immediately upon release. 7) Consider isolating CRMEB instances or deploying them in segmented environments to limit lateral movement if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-09-13T09:45:56.203Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c7591939776bc2a1466a89

Added to database: 9/15/2025, 12:08:57 AM

Last enriched: 9/22/2025, 12:41:20 AM

Last updated: 10/30/2025, 1:20:45 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats