Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13788: SQL Injection in Chanjet CRM

0
Medium
VulnerabilityCVE-2025-13788cvecve-2025-13788
Published: Sun Nov 30 2025 (11/30/2025, 12:32:05 UTC)
Source: CVE Database V5
Vendor/Project: Chanjet
Product: CRM

Description

A vulnerability has been found in Chanjet CRM up to 20251106. The impacted element is an unknown function of the file /tools/upgradeattribute.php. The manipulation of the argument gblOrgID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 11/30/2025, 13:13:48 UTC

Technical Analysis

CVE-2025-13788 is a SQL injection vulnerability identified in Chanjet CRM up to version 20251106. The vulnerability resides in an unspecified function within the /tools/upgradeattribute.php file, specifically involving the gblOrgID parameter. This parameter is susceptible to SQL injection due to inadequate input validation or sanitization, allowing an attacker to craft malicious SQL queries that the backend database executes. The attack vector is remote and does not require authentication or user interaction, increasing the risk profile. The CVSS 4.0 score is 6.9 (medium severity), reflecting the vulnerability's potential to partially impact confidentiality, integrity, and availability of the CRM data. The vendor was notified early but has not issued a patch or mitigation guidance. No known exploits are currently active in the wild, but public disclosure increases the risk of exploitation attempts. This vulnerability could allow attackers to extract sensitive customer data, modify records, or disrupt CRM operations, which are critical for business processes. The lack of vendor response and patch availability necessitates that organizations implement their own mitigations and monitor for suspicious activity. The vulnerability highlights the importance of secure coding practices, especially input validation and use of parameterized queries in web applications handling business-critical data.

Potential Impact

For European organizations, the impact of CVE-2025-13788 can be significant, especially for those relying on Chanjet CRM for customer relationship management, sales, and support operations. Exploitation could lead to unauthorized access to sensitive customer and business data, resulting in data breaches that violate GDPR and other data protection regulations, potentially incurring heavy fines and reputational damage. Integrity of CRM data could be compromised, leading to corrupted records, fraudulent transactions, or operational disruptions. Availability impacts could arise if attackers manipulate database queries to cause denial of service or data loss. Given the remote, unauthenticated nature of the exploit, attackers can target vulnerable systems from anywhere, increasing the threat surface. The absence of a vendor patch means organizations must rely on internal controls and compensating measures, increasing operational risk. Industries such as finance, retail, and manufacturing, which heavily depend on CRM data for customer interactions and compliance, are particularly vulnerable. The threat also raises concerns about supply chain security if third-party vendors use Chanjet CRM. Overall, the vulnerability poses a moderate to high risk to European businesses’ data security and operational continuity.

Mitigation Recommendations

To mitigate CVE-2025-13788, European organizations using Chanjet CRM should immediately implement the following measures: 1) Apply strict input validation on the gblOrgID parameter and any other user-supplied inputs, ensuring only expected data types and formats are accepted. 2) Refactor the vulnerable code to use parameterized queries or prepared statements to prevent SQL injection. 3) Deploy Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting the /tools/upgradeattribute.php endpoint. 4) Restrict network access to the CRM application to trusted IP ranges where possible, reducing exposure to remote attacks. 5) Monitor application logs and database queries for anomalous activity indicative of injection attempts. 6) Conduct thorough security assessments and code reviews of the CRM system to identify and remediate other potential injection points. 7) Engage with Chanjet or third-party security experts to develop or obtain patches or secure updates. 8) Implement regular backups of CRM data and test restoration procedures to minimize impact of potential data corruption or loss. 9) Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving SQL injection attacks. These targeted actions go beyond generic advice and address the specific technical and operational context of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-29T20:25:48.356Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692c3f82c10e5a11c9bde77a

Added to database: 11/30/2025, 12:58:42 PM

Last enriched: 11/30/2025, 1:13:48 PM

Last updated: 12/4/2025, 4:40:39 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats