CVE-2025-13177: Cross-Site Request Forgery in Bdtask SalesERP
A vulnerability was detected in Bdtask/CodeCanyon SalesERP up to 20250728. This affects an unknown part. The manipulation results in cross-site request forgery. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13177 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Bdtask's SalesERP software up to version 20250728. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests to a web application, leading to unintended actions executed with the victim’s privileges. This vulnerability is remotely exploitable without requiring any authentication or privileges, but it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The CVSS 4.0 vector indicates an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and impacts limited integrity (VI:L) without affecting confidentiality or availability. The vulnerability affects an unspecified component of SalesERP, which is an enterprise resource planning system used for business management. The vendor was notified early but has not responded, and no patches or mitigations have been officially released. While no known exploits are currently active in the wild, the public availability of exploit details increases the risk of exploitation. The vulnerability could allow attackers to perform unauthorized operations such as modifying sales data, altering configurations, or triggering business processes, potentially disrupting business operations or causing data integrity issues.
Potential Impact
For European organizations, the impact of CVE-2025-13177 can be significant, particularly for those relying on Bdtask SalesERP for critical business functions such as sales management, inventory control, and financial operations. Successful exploitation could lead to unauthorized transactions, data manipulation, or disruption of business workflows, undermining data integrity and operational reliability. Although confidentiality and availability impacts are limited, the integrity compromise can result in financial discrepancies, compliance violations, and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, especially in environments where users access SalesERP via web browsers. European companies in sectors like manufacturing, retail, and distribution that use SalesERP are at higher risk. The lack of vendor response and patches means organizations must proactively implement mitigations to reduce exposure. Additionally, the public disclosure of exploit details may attract attackers targeting European businesses with valuable ERP data.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls to mitigate CVE-2025-13177. First, enforce anti-CSRF tokens on all state-changing requests within SalesERP to ensure requests originate from legitimate users. Second, restrict HTTP methods to only those necessary (e.g., disallow unsafe methods like PUT or DELETE if unused). Third, configure web application firewalls (WAFs) to detect and block suspicious CSRF patterns or anomalous requests. Fourth, apply the SameSite attribute to cookies to limit cross-origin requests. Fifth, educate users about the risks of clicking unsolicited links or visiting untrusted websites while authenticated to SalesERP. Sixth, isolate SalesERP access to trusted networks or VPNs to reduce exposure. Finally, monitor logs for unusual activity indicative of CSRF exploitation attempts. Organizations should also engage with Bdtask for updates and consider alternative ERP solutions if timely patches are not forthcoming.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-13177: Cross-Site Request Forgery in Bdtask SalesERP
Description
A vulnerability was detected in Bdtask/CodeCanyon SalesERP up to 20250728. This affects an unknown part. The manipulation results in cross-site request forgery. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13177 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Bdtask's SalesERP software up to version 20250728. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests to a web application, leading to unintended actions executed with the victim’s privileges. This vulnerability is remotely exploitable without requiring any authentication or privileges, but it does require user interaction, such as clicking a malicious link or visiting a crafted webpage. The CVSS 4.0 vector indicates an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), and impacts limited integrity (VI:L) without affecting confidentiality or availability. The vulnerability affects an unspecified component of SalesERP, which is an enterprise resource planning system used for business management. The vendor was notified early but has not responded, and no patches or mitigations have been officially released. While no known exploits are currently active in the wild, the public availability of exploit details increases the risk of exploitation. The vulnerability could allow attackers to perform unauthorized operations such as modifying sales data, altering configurations, or triggering business processes, potentially disrupting business operations or causing data integrity issues.
Potential Impact
For European organizations, the impact of CVE-2025-13177 can be significant, particularly for those relying on Bdtask SalesERP for critical business functions such as sales management, inventory control, and financial operations. Successful exploitation could lead to unauthorized transactions, data manipulation, or disruption of business workflows, undermining data integrity and operational reliability. Although confidentiality and availability impacts are limited, the integrity compromise can result in financial discrepancies, compliance violations, and reputational damage. The remote and unauthenticated nature of the exploit increases the attack surface, especially in environments where users access SalesERP via web browsers. European companies in sectors like manufacturing, retail, and distribution that use SalesERP are at higher risk. The lack of vendor response and patches means organizations must proactively implement mitigations to reduce exposure. Additionally, the public disclosure of exploit details may attract attackers targeting European businesses with valuable ERP data.
Mitigation Recommendations
Given the absence of official patches, European organizations should implement immediate compensating controls to mitigate CVE-2025-13177. First, enforce anti-CSRF tokens on all state-changing requests within SalesERP to ensure requests originate from legitimate users. Second, restrict HTTP methods to only those necessary (e.g., disallow unsafe methods like PUT or DELETE if unused). Third, configure web application firewalls (WAFs) to detect and block suspicious CSRF patterns or anomalous requests. Fourth, apply the SameSite attribute to cookies to limit cross-origin requests. Fifth, educate users about the risks of clicking unsolicited links or visiting untrusted websites while authenticated to SalesERP. Sixth, isolate SalesERP access to trusted networks or VPNs to reduce exposure. Finally, monitor logs for unusual activity indicative of CSRF exploitation attempts. Organizations should also engage with Bdtask for updates and consider alternative ERP solutions if timely patches are not forthcoming.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T11:01:37.829Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69177ea4901ba91f3226fd4f
Added to database: 11/14/2025, 7:10:28 PM
Last enriched: 11/21/2025, 7:56:48 PM
Last updated: 1/7/2026, 8:52:58 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.