Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41106: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework

0
Medium
VulnerabilityCVE-2025-41106cvecve-2025-41106cwe-79
Published: Tue Nov 11 2025 (11/11/2025, 12:21:07 UTC)
Source: CVE Database V5
Vendor/Project: Fairsketch
Product: RISE CRM Framework

Description

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'first_name' in '/clients/save_contact/'.

AI-Powered Analysis

AILast updated: 11/11/2025, 12:31:42 UTC

Technical Analysis

CVE-2025-41106 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The vulnerability stems from improper neutralization of user input in the 'first_name' parameter during the processing of POST requests to the '/clients/save_contact/' endpoint. Specifically, the application fails to adequately sanitize or encode HTML input, allowing an attacker to inject arbitrary HTML or JavaScript code. When a victim user accesses a page rendering this injected content, the malicious script executes in their browser context, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability is remotely exploitable over the network without requiring authentication, but it does require user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P), with no impact on confidentiality, integrity, or availability, but with limited scope change (SI:L). No public exploits have been reported to date. The vulnerability affects all versions prior to 3.9, and no official patches have been linked yet. The vulnerability was reserved in April 2025 and published in November 2025, with INCIBE as the assigner. Given the nature of CRM systems, exploitation could lead to targeted attacks on business users, data leakage, or social engineering campaigns leveraging the injected scripts.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data within the affected CRM framework. Successful exploitation could allow attackers to hijack user sessions, steal sensitive customer or business data, or perform actions on behalf of legitimate users, potentially leading to data breaches or fraud. The impact is heightened in sectors relying heavily on CRM systems for customer relationship management, such as finance, retail, and professional services. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users into triggering the malicious payload. The lack of known exploits reduces immediate risk but should not lead to complacency. Organizations using RISE CRM Framework versions prior to 3.9 should consider this a significant threat vector, especially given the increasing regulatory scrutiny in Europe around data protection (e.g., GDPR). Failure to address this vulnerability could result in reputational damage, regulatory penalties, and operational disruption.

Mitigation Recommendations

Organizations should immediately upgrade the Fairsketch RISE CRM Framework to version 3.9 or later once available, as this is the definitive fix for the vulnerability. Until a patch is applied, implement strict input validation and output encoding on the 'first_name' parameter at the application or web server level to neutralize HTML or script content. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Conduct regular security awareness training to educate users about the risks of interacting with suspicious links or content that could trigger XSS attacks. Monitor web application logs for unusual POST requests to '/clients/save_contact/' containing suspicious payloads. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject HTML or JavaScript via the vulnerable parameter. Review and tighten user privilege levels to minimize the impact of compromised sessions. Finally, perform regular security testing, including automated scanning and manual penetration testing, focusing on input validation and XSS vulnerabilities in CRM components.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:39.343Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69132c9785a5d1234f7108f8

Added to database: 11/11/2025, 12:31:19 PM

Last enriched: 11/11/2025, 12:31:42 PM

Last updated: 11/11/2025, 5:06:44 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats