Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41105: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework

0
Medium
VulnerabilityCVE-2025-41105cvecve-2025-41105cwe-79
Published: Tue Nov 11 2025 (11/11/2025, 12:19:05 UTC)
Source: CVE Database V5
Vendor/Project: Fairsketch
Product: RISE CRM Framework

Description

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'title' in '/tickets/save'.

AI-Powered Analysis

AILast updated: 11/11/2025, 12:31:56 UTC

Technical Analysis

CVE-2025-41105 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The vulnerability stems from insufficient sanitization and validation of user-supplied input in the 'title' parameter of the '/tickets/save' endpoint, which accepts POST requests. This flaw allows an attacker to inject arbitrary HTML or JavaScript code that is then rendered in the victim's browser when viewing affected pages. The vulnerability does not require authentication but does require user interaction to trigger the malicious payload. The CVSS 4.0 base score is 5.1, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, no privileges required, but user interaction needed. The scope is limited to the vulnerable component without affecting other system components. No known exploits have been reported in the wild, and no official patches have been linked yet. The vulnerability could be leveraged to perform session hijacking, defacement, or phishing attacks within the CRM environment, compromising user trust and potentially leading to further exploitation if combined with other vulnerabilities.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality and integrity of user sessions within the Fairsketch RISE CRM environment. Successful exploitation could allow attackers to execute malicious scripts, steal session cookies, or perform unauthorized actions on behalf of legitimate users. This can lead to data leakage, unauthorized access to sensitive customer or business information, and reputational damage. The impact is heightened in sectors relying heavily on CRM systems for customer data management, such as finance, healthcare, and government agencies. While availability is not directly affected, the indirect consequences of trust erosion and potential regulatory non-compliance with GDPR regarding data protection could be significant. Organizations using versions prior to 3.9 should consider the risk of targeted phishing campaigns leveraging this vulnerability to escalate attacks.

Mitigation Recommendations

To mitigate CVE-2025-41105, European organizations should immediately upgrade the Fairsketch RISE CRM Framework to version 3.9 or later once available. In the absence of an official patch, implement strict input validation and output encoding on the 'title' parameter at the application level to neutralize HTML and script content. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts within the CRM web interface. Conduct thorough security testing, including automated scanning and manual code reviews, focusing on input sanitization mechanisms. Educate users about phishing risks and suspicious links that could exploit this vulnerability. Additionally, monitor web logs for unusual POST requests to '/tickets/save' and anomalous user behavior indicative of exploitation attempts. Deploy web application firewalls (WAFs) with custom rules to detect and block malicious payloads targeting this endpoint. Finally, maintain an incident response plan tailored to web application attacks to quickly contain and remediate any exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:39.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69132c9785a5d1234f7108f5

Added to database: 11/11/2025, 12:31:19 PM

Last enriched: 11/11/2025, 12:31:56 PM

Last updated: 11/11/2025, 4:27:31 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats