CVE-2025-13177: Cross-Site Request Forgery in Bdtask SalesERP
A vulnerability was detected in Bdtask/CodeCanyon SalesERP up to 20250728. This affects an unknown part. The manipulation results in cross-site request forgery. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-13177 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Bdtask's SalesERP software, specifically affecting versions up to 20250728. CSRF vulnerabilities enable attackers to induce authenticated users to perform unintended actions on a web application without their consent. In this case, the vulnerability allows remote attackers to craft malicious web requests that, when executed by a logged-in user, can manipulate the ERP system's functions. The vulnerability does not require any authentication or privileges, but it does require the victim to interact with a malicious link or webpage (user interaction). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (C:N), low impact on integrity (I:L), and no impact on availability (A:N). This suggests that while the vulnerability can alter data or state within the ERP, it does not expose sensitive information or cause denial of service. The vendor was contacted early but has not responded or provided a patch, and no known exploits have been observed in the wild yet. Given the nature of ERP systems, unauthorized actions could disrupt business processes, alter sales or inventory data, or affect financial records. The lack of vendor response increases the risk window, emphasizing the need for immediate mitigation by users. The vulnerability is categorized as medium severity with a CVSS score of 5.3, reflecting moderate risk.
Potential Impact
For European organizations, the impact of this CSRF vulnerability in SalesERP can be significant depending on the extent of ERP integration in their business processes. SalesERP is typically used for managing sales, inventory, and customer relations, so unauthorized actions could lead to data integrity issues, financial discrepancies, or operational disruptions. While confidentiality is not directly impacted, integrity issues could cascade into compliance violations, inaccurate reporting, and loss of trust. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. European companies in sectors such as manufacturing, retail, and distribution that rely heavily on SalesERP for daily operations are at higher risk. The absence of a vendor patch prolongs exposure, increasing the likelihood of exploitation once public proof-of-concept exploits emerge. Additionally, regulatory frameworks like GDPR impose strict data integrity and security requirements, so exploitation could result in legal and reputational consequences. Overall, the vulnerability poses a moderate operational and compliance risk to European organizations using the affected ERP software.
Mitigation Recommendations
1. Implement anti-CSRF tokens in all state-changing requests within SalesERP if possible, either through configuration or custom development. 2. Restrict sensitive operations to POST requests and validate the HTTP Referer and Origin headers to ensure requests originate from trusted sources. 3. Educate users about phishing and social engineering risks to reduce the chance of clicking malicious links that trigger CSRF attacks. 4. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting SalesERP endpoints. 5. Isolate the ERP system within a segmented network zone with strict access controls to limit exposure. 6. Monitor logs for unusual or unauthorized actions that could indicate exploitation attempts. 7. Regularly back up ERP data and verify integrity to enable recovery in case of malicious changes. 8. Engage with the vendor or community to track patch releases or unofficial fixes and apply them promptly. 9. Consider deploying browser security features such as SameSite cookies to reduce CSRF risks. 10. If feasible, restrict ERP access to trusted IP ranges or VPN connections to reduce attack surface.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland
CVE-2025-13177: Cross-Site Request Forgery in Bdtask SalesERP
Description
A vulnerability was detected in Bdtask/CodeCanyon SalesERP up to 20250728. This affects an unknown part. The manipulation results in cross-site request forgery. The attack can be executed remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-13177 is a Cross-Site Request Forgery (CSRF) vulnerability identified in Bdtask's SalesERP software, specifically affecting versions up to 20250728. CSRF vulnerabilities enable attackers to induce authenticated users to perform unintended actions on a web application without their consent. In this case, the vulnerability allows remote attackers to craft malicious web requests that, when executed by a logged-in user, can manipulate the ERP system's functions. The vulnerability does not require any authentication or privileges, but it does require the victim to interact with a malicious link or webpage (user interaction). The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:P), no impact on confidentiality (C:N), low impact on integrity (I:L), and no impact on availability (A:N). This suggests that while the vulnerability can alter data or state within the ERP, it does not expose sensitive information or cause denial of service. The vendor was contacted early but has not responded or provided a patch, and no known exploits have been observed in the wild yet. Given the nature of ERP systems, unauthorized actions could disrupt business processes, alter sales or inventory data, or affect financial records. The lack of vendor response increases the risk window, emphasizing the need for immediate mitigation by users. The vulnerability is categorized as medium severity with a CVSS score of 5.3, reflecting moderate risk.
Potential Impact
For European organizations, the impact of this CSRF vulnerability in SalesERP can be significant depending on the extent of ERP integration in their business processes. SalesERP is typically used for managing sales, inventory, and customer relations, so unauthorized actions could lead to data integrity issues, financial discrepancies, or operational disruptions. While confidentiality is not directly impacted, integrity issues could cascade into compliance violations, inaccurate reporting, and loss of trust. The requirement for user interaction means phishing or social engineering campaigns could be used to exploit this vulnerability. European companies in sectors such as manufacturing, retail, and distribution that rely heavily on SalesERP for daily operations are at higher risk. The absence of a vendor patch prolongs exposure, increasing the likelihood of exploitation once public proof-of-concept exploits emerge. Additionally, regulatory frameworks like GDPR impose strict data integrity and security requirements, so exploitation could result in legal and reputational consequences. Overall, the vulnerability poses a moderate operational and compliance risk to European organizations using the affected ERP software.
Mitigation Recommendations
1. Implement anti-CSRF tokens in all state-changing requests within SalesERP if possible, either through configuration or custom development. 2. Restrict sensitive operations to POST requests and validate the HTTP Referer and Origin headers to ensure requests originate from trusted sources. 3. Educate users about phishing and social engineering risks to reduce the chance of clicking malicious links that trigger CSRF attacks. 4. Employ web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting SalesERP endpoints. 5. Isolate the ERP system within a segmented network zone with strict access controls to limit exposure. 6. Monitor logs for unusual or unauthorized actions that could indicate exploitation attempts. 7. Regularly back up ERP data and verify integrity to enable recovery in case of malicious changes. 8. Engage with the vendor or community to track patch releases or unofficial fixes and apply them promptly. 9. Consider deploying browser security features such as SameSite cookies to reduce CSRF risks. 10. If feasible, restrict ERP access to trusted IP ranges or VPN connections to reduce attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-11-14T11:01:37.829Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69177ea4901ba91f3226fd4f
Added to database: 11/14/2025, 7:10:28 PM
Last enriched: 11/14/2025, 7:17:30 PM
Last updated: 11/16/2025, 5:50:03 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13251: SQL Injection in WeiYe-Jing datax-web
MediumCVE-2025-13250: Improper Access Controls in WeiYe-Jing datax-web
MediumCVE-2025-13249: Unrestricted Upload in Jiusi OA
MediumCVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.