Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-40640: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Status Tracker Energy CRM

0
Medium
VulnerabilityCVE-2025-40640cvecve-2025-40640cwe-79
Published: Fri Oct 10 2025 (10/10/2025, 08:19:33 UTC)
Source: CVE Database V5
Vendor/Project: Status Tracker
Product: Energy CRM

Description

Stored Cross-Site Scripting (XSS) vulnerability in Energy CRM v2025 by Status Tracker Ltd, consisting of a stored XSS due to lack of proper validation of user input by sending a POST request to “/crm/create_invoice_submit.php”, using the “customerName_0” parameter. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details.

AI-Powered Analysis

AILast updated: 10/23/2025, 11:24:30 UTC

Technical Analysis

CVE-2025-40640 is a stored Cross-Site Scripting (XSS) vulnerability identified in Status Tracker's Energy CRM version 2025. The flaw is due to improper neutralization of user input during web page generation, specifically in the 'customerName_0' parameter processed by the /crm/create_invoice_submit.php endpoint. When an authenticated user submits a POST request with malicious JavaScript code embedded in this parameter, the input is stored and later rendered without proper sanitization in the CRM interface. This allows an attacker to execute arbitrary scripts in the context of other authenticated users who view the affected page. The impact includes theft of session cookies, enabling session hijacking, unauthorized actions, and potential data exfiltration. The vulnerability requires the attacker to have low privileges (authenticated user) and some user interaction (victim viewing the malicious content). The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required to exploit (though authentication is needed), and user interaction is necessary. No public exploits have been reported yet, but the vulnerability poses a significant risk if weaponized. The lack of patch links suggests a fix may not yet be publicly available, emphasizing the need for immediate mitigation steps by affected organizations.

Potential Impact

For European organizations, especially those in the energy sector relying on Status Tracker's Energy CRM, this vulnerability could lead to unauthorized access to sensitive customer and operational data. Session hijacking via stolen cookies can allow attackers to impersonate legitimate users, potentially leading to fraudulent invoice creation, data manipulation, or disruption of business processes. Given the critical nature of energy infrastructure in Europe, exploitation could have cascading effects on operational continuity and regulatory compliance. The medium severity score reflects a moderate but tangible risk, particularly in environments where CRM access controls are weak or where users have elevated privileges. The requirement for authentication limits exposure but does not eliminate risk, as insider threats or compromised accounts could be leveraged. The absence of known exploits currently provides a window for proactive defense, but the stored nature of the XSS means persistent risk once exploited.

Mitigation Recommendations

1. Implement strict input validation and output encoding on the 'customerName_0' parameter to neutralize malicious scripts before storage and rendering. 2. Apply Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the CRM web application. 3. Restrict access to the /crm/create_invoice_submit.php endpoint to only trusted and necessary users, employing strong authentication and authorization controls. 4. Monitor application logs and user activity for unusual POST requests or unexpected script injections. 5. Educate users about phishing and social engineering risks that could lead to credential compromise. 6. If possible, isolate the CRM environment from broader corporate networks to limit lateral movement. 7. Engage with Status Tracker for official patches or updates and apply them promptly once available. 8. Conduct regular security assessments and penetration testing focusing on web application vulnerabilities. 9. Consider implementing web application firewalls (WAF) with rules to detect and block XSS payloads targeting this parameter.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T08:38:10.819Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68e8c37b9fd71783de462c91

Added to database: 10/10/2025, 8:27:39 AM

Last enriched: 10/23/2025, 11:24:30 AM

Last updated: 11/23/2025, 5:53:47 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats