Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15442: SQL Injection in CRMEB

0
Medium
VulnerabilityCVE-2025-15442cvecve-2025-15442
Published: Sun Jan 04 2026 (01/04/2026, 11:02:06 UTC)
Source: CVE Database V5
Product: CRMEB

Description

A vulnerability was determined in CRMEB up to 5.6.1. This vulnerability affects unknown code of the file /adminapi/export/product_list. This manipulation of the argument cate_id causes sql injection. The attack may be initiated remotely. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 23:04:32 UTC

Technical Analysis

CVE-2025-15442 identifies a SQL injection vulnerability in the CRMEB application, specifically in versions 5.6.0 and 5.6.1. The vulnerability is located in the /adminapi/export/product_list endpoint, where the cate_id parameter is susceptible to SQL injection due to insufficient input validation or sanitization. An attacker with high privileges can remotely manipulate this parameter to execute arbitrary SQL queries against the backend database. The vulnerability does not require user interaction but does require authenticated access with elevated privileges, which limits the attack vector to insiders or compromised accounts with admin rights. The CVSS 4.0 base score is 5.1, reflecting medium severity, with network attack vector, low complexity, no user interaction, and partial impact on confidentiality, integrity, and availability. The vendor was notified but has not issued a patch or response, and no public exploits have been confirmed in the wild. This vulnerability could allow attackers to extract sensitive data, modify or delete records, or disrupt database operations, depending on the injected payload. The lack of vendor response and patch availability increases the risk for organizations relying on these CRMEB versions.

Potential Impact

The impact of CVE-2025-15442 can be significant for organizations using CRMEB versions 5.6.0 and 5.6.1, especially those with sensitive customer or product data stored in the affected database. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service through database corruption or disruption. Since the vulnerability requires high privilege access, the primary risk involves insider threats or attackers who have already compromised administrative credentials. However, once exploited, attackers could escalate their access or move laterally within the network. This could result in loss of customer trust, regulatory penalties due to data breaches, and operational downtime. The absence of vendor patches means organizations must rely on alternative mitigations, increasing operational overhead and risk exposure. Industries such as e-commerce, retail, and service providers using CRMEB for customer relationship management are particularly vulnerable.

Mitigation Recommendations

1. Immediately restrict access to the /adminapi/export/product_list endpoint to only trusted and necessary administrative users, ideally through network segmentation and firewall rules. 2. Implement strict input validation and sanitization on the cate_id parameter at the application or web server level using web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns. 3. Enforce multi-factor authentication and strong password policies for all administrative accounts to reduce the risk of credential compromise. 4. Monitor logs for unusual queries or access patterns related to the vulnerable endpoint to detect potential exploitation attempts early. 5. If possible, upgrade to a CRMEB version that addresses this vulnerability once available or apply community-developed patches or workarounds. 6. Conduct regular security assessments and code reviews focusing on input handling in CRMEB and similar applications. 7. Limit database user permissions associated with the CRMEB application to the minimum required to reduce the impact of a successful injection.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-03T18:41:59.217Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695a4b97db813ff03ecbba64

Added to database: 1/4/2026, 11:14:31 AM

Last enriched: 2/23/2026, 11:04:32 PM

Last updated: 3/25/2026, 5:58:50 PM

Views: 101

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses