CVE-2025-41101: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.
AI Analysis
Technical Summary
CVE-2025-41101 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The flaw is due to improper neutralization of user input during web page generation, specifically in the 'title' parameter submitted via a POST request to the /projects/save endpoint. Because the application fails to properly validate or sanitize this input, an attacker can inject arbitrary HTML or JavaScript code. This vulnerability can be exploited remotely over the network without authentication but requires some user interaction, such as tricking a user into submitting or viewing malicious content. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The vulnerability does not impact confidentiality, integrity, or availability directly but can lead to indirect impacts such as session hijacking, credential theft, or unauthorized actions performed in the context of the victim user. No patches are currently listed, and no known exploits have been reported in the wild. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions within the affected CRM framework. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or manipulation of CRM data. This could disrupt business operations, damage customer trust, and lead to regulatory compliance issues under GDPR if personal data is compromised. The medium severity score reflects that while the vulnerability does not directly cause system downtime or data destruction, the indirect consequences can be significant, especially in sectors relying heavily on CRM data such as finance, healthcare, and retail. Given the network-exploitable nature and low complexity, attackers could target European companies using vulnerable versions, particularly those with exposed CRM interfaces accessible from the internet or internal networks with insufficient segmentation.
Mitigation Recommendations
European organizations using Fairsketch RISE CRM Framework versions prior to 3.9 should immediately plan to upgrade to version 3.9 or later once available. In the absence of an official patch, implement strict input validation and sanitization on the 'title' parameter at the application or web server level to block malicious HTML or script content. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct regular security audits and penetration testing focused on input handling in CRM modules. Educate users about the risks of clicking on suspicious links or submitting untrusted content. Network segmentation and limiting access to the CRM interface to trusted users and IP ranges can reduce exposure. Monitor logs for unusual POST requests to /projects/save and anomalous user behavior indicative of exploitation attempts. Finally, maintain up-to-date backups to recover quickly from any compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2025-41101: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework
Description
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in'/projects/save'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41101 identifies a Cross-site Scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The flaw is due to improper neutralization of user input during web page generation, specifically in the 'title' parameter submitted via a POST request to the /projects/save endpoint. Because the application fails to properly validate or sanitize this input, an attacker can inject arbitrary HTML or JavaScript code. This vulnerability can be exploited remotely over the network without authentication but requires some user interaction, such as tricking a user into submitting or viewing malicious content. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed (UI:P). The vulnerability does not impact confidentiality, integrity, or availability directly but can lead to indirect impacts such as session hijacking, credential theft, or unauthorized actions performed in the context of the victim user. No patches are currently listed, and no known exploits have been reported in the wild. The vulnerability was reserved in April 2025 and published in November 2025 by INCIBE, indicating recent discovery and disclosure.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions within the affected CRM framework. Successful exploitation could allow attackers to execute arbitrary scripts in the context of authenticated users, potentially leading to session hijacking, theft of sensitive information, or manipulation of CRM data. This could disrupt business operations, damage customer trust, and lead to regulatory compliance issues under GDPR if personal data is compromised. The medium severity score reflects that while the vulnerability does not directly cause system downtime or data destruction, the indirect consequences can be significant, especially in sectors relying heavily on CRM data such as finance, healthcare, and retail. Given the network-exploitable nature and low complexity, attackers could target European companies using vulnerable versions, particularly those with exposed CRM interfaces accessible from the internet or internal networks with insufficient segmentation.
Mitigation Recommendations
European organizations using Fairsketch RISE CRM Framework versions prior to 3.9 should immediately plan to upgrade to version 3.9 or later once available. In the absence of an official patch, implement strict input validation and sanitization on the 'title' parameter at the application or web server level to block malicious HTML or script content. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts and reduce the impact of potential XSS attacks. Conduct regular security audits and penetration testing focused on input handling in CRM modules. Educate users about the risks of clicking on suspicious links or submitting untrusted content. Network segmentation and limiting access to the CRM interface to trusted users and IP ranges can reduce exposure. Monitor logs for unusual POST requests to /projects/save and anomalous user behavior indicative of exploitation attempts. Finally, maintain up-to-date backups to recover quickly from any compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:37.997Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69132437f1a0d9a2f12d675d
Added to database: 11/11/2025, 11:55:35 AM
Last enriched: 11/11/2025, 12:10:43 PM
Last updated: 11/12/2025, 8:00:54 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13058: Cross Site Scripting in soerennb eXtplorer
MediumCVE-2025-8485: CWE-276: Incorrect Default Permissions in Lenovo App Store
HighCVE-2025-8421: CWE-276: Incorrect Default Permissions in Lenovo Dock Manager
MediumCVE-2025-64117: CWE-352: Cross-Site Request Forgery (CSRF) in Enalean tuleap
MediumCVE-2025-27368: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in IBM OpenPages
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.