Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41104: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework

0
Medium
VulnerabilityCVE-2025-41104cvecve-2025-41104cwe-79
Published: Tue Nov 11 2025 (11/11/2025, 12:17:41 UTC)
Source: CVE Database V5
Vendor/Project: Fairsketch
Product: RISE CRM Framework

Description

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'custom_field_1' in '/estimate_requests/save_estimate_request'.

AI-Powered Analysis

AILast updated: 11/18/2025, 13:15:01 UTC

Technical Analysis

CVE-2025-41104 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The vulnerability stems from improper neutralization of user-supplied input in the 'custom_field_1' parameter when processing POST requests to the '/estimate_requests/save_estimate_request' endpoint. Specifically, the application fails to adequately validate or sanitize HTML content submitted by users, allowing attackers to inject malicious HTML or JavaScript code. When a victim views the affected page containing the injected code, the malicious script executes in their browser context, potentially leading to session hijacking, credential theft, or unauthorized actions performed on behalf of the user. The CVSS 4.0 vector indicates the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), no privileges required (PR:L, meaning limited privileges), and requires user interaction (UI:P). The vulnerability does not impact confidentiality, integrity, or availability directly (VC:N, VI:N, VA:N), but the scope is limited (SI:L), and no security requirements are bypassed (SA:N). No public exploits have been reported yet, but the presence of this vulnerability in a CRM framework used for customer relationship management poses a risk to organizations relying on this software for business operations. The lack of a patch at the time of reporting necessitates immediate attention to mitigate potential exploitation.

Potential Impact

For European organizations using Fairsketch's RISE CRM Framework, this vulnerability could lead to unauthorized execution of scripts in users' browsers, resulting in session hijacking, theft of sensitive customer data, or manipulation of CRM data. This can undermine customer trust, lead to data breaches under GDPR regulations, and cause reputational damage. Since CRM systems often contain personal and business-critical information, exploitation could disrupt business processes and expose confidential client information. The medium severity indicates a moderate risk, but the ease of exploitation and the potential for phishing or social engineering attacks leveraging this vulnerability increase its threat level. Organizations in sectors such as finance, healthcare, and retail, which heavily rely on CRM systems, could face significant operational and compliance impacts if exploited.

Mitigation Recommendations

1. Upgrade the Fairsketch RISE CRM Framework to version 3.9 or later once the vendor releases a patch addressing this vulnerability. 2. Implement strict server-side input validation and sanitization for all user inputs, especially the 'custom_field_1' parameter, to reject or neutralize malicious HTML or script content. 3. Apply output encoding on all dynamic content rendered in web pages to prevent execution of injected scripts. 4. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser. 5. Conduct regular security assessments and penetration testing focused on input validation and XSS vulnerabilities. 6. Educate users and administrators about the risks of XSS and encourage cautious interaction with unexpected or suspicious CRM content. 7. Monitor web application logs for unusual POST requests or patterns indicative of attempted exploitation. 8. Consider deploying web application firewalls (WAFs) with rules tailored to detect and block XSS payloads targeting the affected endpoint.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:37.997Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69132c9785a5d1234f7108f2

Added to database: 11/11/2025, 12:31:19 PM

Last enriched: 11/18/2025, 1:15:01 PM

Last updated: 12/26/2025, 9:19:52 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats