Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13177: Cross-Site Request Forgery in Bdtask SalesERP

0
Medium
VulnerabilityCVE-2025-13177cvecve-2025-13177
Published: Fri Nov 14 2025 (11/14/2025, 19:02:07 UTC)
Source: CVE Database V5
Vendor/Project: Bdtask
Product: SalesERP

Description

A vulnerability was detected in Bdtask/CodeCanyon SalesERP up to 20250728. This affects an unknown part. The manipulation results in cross-site request forgery. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/21/2025, 19:56:48 UTC

Technical Analysis

CVE-2025-13177 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Bdtask's SalesERP software up to version 20250728. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests to a web application, leading to unintended actions executed with the victim’s privileges. This vulnerability is remotely exploitable without requiring any authentication or privileges, but it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The CVSS 4.0 vector indicates an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and impacts limited integrity (VI:L) without affecting confidentiality or availability. The vulnerability affects an unspecified component of SalesERP, which is an enterprise resource planning system used for business management. The vendor was notified early but has not responded, and no patches or mitigations have been officially released. While no known exploits are currently active in the wild, the public availability of exploit details increases the risk of exploitation. The vulnerability could allow attackers to perform unauthorized operations such as modifying sales data, altering configurations, or triggering business processes, potentially disrupting business operations or causing data integrity issues.

Potential Impact

For European organizations, the impact of CVE-2025-13177 can be significant, particularly for those relying on Bdtask SalesERP for critical business functions such as sales management, inventory control, and financial operations. Successful exploitation could lead to unauthorized transactions, data manipulation, or disruption of business workflows, undermining data integrity and operational reliability. Although confidentiality and availability impacts are limited, the integrity compromise can result in financial discrepancies, compliance violations, and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, especially in environments where users access SalesERP via web browsers. European companies in sectors like manufacturing, retail, and distribution that use SalesERP are at higher risk. The lack of vendor response and patches means organizations must proactively implement mitigations to reduce exposure. Additionally, the public disclosure of exploit details may attract attackers targeting European businesses with valuable ERP data.

Mitigation Recommendations

Given the absence of official patches, European organizations should implement immediate compensating controls to mitigate CVE-2025-13177. First, enforce anti-CSRF tokens on all state-changing requests within SalesERP to ensure requests originate from legitimate users. Second, restrict HTTP methods to only those necessary (e.g., disallow unsafe methods like PUT or DELETE if unused). Third, configure web application firewalls (WAFs) to detect and block suspicious CSRF patterns or anomalous requests. Fourth, apply the SameSite attribute to cookies to limit cross-origin requests. Fifth, educate users about the risks of clicking unsolicited links or visiting untrusted websites while authenticated to SalesERP. Sixth, isolate SalesERP access to trusted networks or VPNs to reduce exposure. Finally, monitor logs for unusual activity indicative of CSRF exploitation attempts. Organizations should also engage with Bdtask for updates and consider alternative ERP solutions if timely patches are not forthcoming.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T11:01:37.829Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69177ea4901ba91f3226fd4f

Added to database: 11/14/2025, 7:10:28 PM

Last enriched: 11/21/2025, 7:56:48 PM

Last updated: 1/7/2026, 8:52:58 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats