CVE-2025-41106: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'first_name' in '/clients/save_contact/'.
AI Analysis
Technical Summary
CVE-2025-41106 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The vulnerability stems from improper neutralization of user input in the 'first_name' parameter during the processing of POST requests to the '/clients/save_contact/' endpoint. Specifically, the application fails to adequately sanitize or encode HTML input, allowing an attacker to inject arbitrary HTML or JavaScript code. When a victim user accesses a page rendering this injected content, the malicious script executes in their browser context, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability is remotely exploitable over the network without requiring authentication, but it does require user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P), with no impact on confidentiality, integrity, or availability, but with limited scope change (SI:L). No public exploits have been reported to date. The vulnerability affects all versions prior to 3.9, and no official patches have been linked yet. The vulnerability was reserved in April 2025 and published in November 2025, with INCIBE as the assigner. Given the nature of CRM systems, exploitation could lead to targeted attacks on business users, data leakage, or social engineering campaigns leveraging the injected scripts.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data within the affected CRM framework. Successful exploitation could allow attackers to hijack user sessions, steal sensitive customer or business data, or perform actions on behalf of legitimate users, potentially leading to data breaches or fraud. The impact is heightened in sectors relying heavily on CRM systems for customer relationship management, such as finance, retail, and professional services. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users into triggering the malicious payload. The lack of known exploits reduces immediate risk but should not lead to complacency. Organizations using RISE CRM Framework versions prior to 3.9 should consider this a significant threat vector, especially given the increasing regulatory scrutiny in Europe around data protection (e.g., GDPR). Failure to address this vulnerability could result in reputational damage, regulatory penalties, and operational disruption.
Mitigation Recommendations
Organizations should immediately upgrade the Fairsketch RISE CRM Framework to version 3.9 or later once available, as this is the definitive fix for the vulnerability. Until a patch is applied, implement strict input validation and output encoding on the 'first_name' parameter at the application or web server level to neutralize HTML or script content. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Conduct regular security awareness training to educate users about the risks of interacting with suspicious links or content that could trigger XSS attacks. Monitor web application logs for unusual POST requests to '/clients/save_contact/' containing suspicious payloads. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject HTML or JavaScript via the vulnerable parameter. Review and tighten user privilege levels to minimize the impact of compromised sessions. Finally, perform regular security testing, including automated scanning and manual penetration testing, focusing on input validation and XSS vulnerabilities in CRM components.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-41106: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Fairsketch RISE CRM Framework
Description
HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request in parameter 'first_name' in '/clients/save_contact/'.
AI-Powered Analysis
Technical Analysis
CVE-2025-41106 identifies a cross-site scripting (XSS) vulnerability classified under CWE-79 in the Fairsketch RISE CRM Framework version 3.8.1 and earlier. The vulnerability stems from improper neutralization of user input in the 'first_name' parameter during the processing of POST requests to the '/clients/save_contact/' endpoint. Specifically, the application fails to adequately sanitize or encode HTML input, allowing an attacker to inject arbitrary HTML or JavaScript code. When a victim user accesses a page rendering this injected content, the malicious script executes in their browser context, potentially compromising session tokens, redirecting users, or performing unauthorized actions on their behalf. The vulnerability is remotely exploitable over the network without requiring authentication, but it does require user interaction to trigger the malicious payload. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:L), and user interaction required (UI:P), with no impact on confidentiality, integrity, or availability, but with limited scope change (SI:L). No public exploits have been reported to date. The vulnerability affects all versions prior to 3.9, and no official patches have been linked yet. The vulnerability was reserved in April 2025 and published in November 2025, with INCIBE as the assigner. Given the nature of CRM systems, exploitation could lead to targeted attacks on business users, data leakage, or social engineering campaigns leveraging the injected scripts.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data within the affected CRM framework. Successful exploitation could allow attackers to hijack user sessions, steal sensitive customer or business data, or perform actions on behalf of legitimate users, potentially leading to data breaches or fraud. The impact is heightened in sectors relying heavily on CRM systems for customer relationship management, such as finance, retail, and professional services. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to lure users into triggering the malicious payload. The lack of known exploits reduces immediate risk but should not lead to complacency. Organizations using RISE CRM Framework versions prior to 3.9 should consider this a significant threat vector, especially given the increasing regulatory scrutiny in Europe around data protection (e.g., GDPR). Failure to address this vulnerability could result in reputational damage, regulatory penalties, and operational disruption.
Mitigation Recommendations
Organizations should immediately upgrade the Fairsketch RISE CRM Framework to version 3.9 or later once available, as this is the definitive fix for the vulnerability. Until a patch is applied, implement strict input validation and output encoding on the 'first_name' parameter at the application or web server level to neutralize HTML or script content. Deploy Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in the browser context. Conduct regular security awareness training to educate users about the risks of interacting with suspicious links or content that could trigger XSS attacks. Monitor web application logs for unusual POST requests to '/clients/save_contact/' containing suspicious payloads. Employ web application firewalls (WAFs) with custom rules to detect and block attempts to inject HTML or JavaScript via the vulnerable parameter. Review and tighten user privilege levels to minimize the impact of compromised sessions. Finally, perform regular security testing, including automated scanning and manual penetration testing, focusing on input validation and XSS vulnerabilities in CRM components.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- INCIBE
- Date Reserved
- 2025-04-16T09:09:39.343Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69132c9785a5d1234f7108f8
Added to database: 11/11/2025, 12:31:19 PM
Last enriched: 11/11/2025, 12:31:42 PM
Last updated: 11/11/2025, 5:06:44 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-35972: Escalation of Privilege in Intel MPI Library
MediumCVE-2025-35971: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
HighCVE-2025-35968: Escalation of Privilege in Slim Bootloader
HighCVE-2025-35967: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
HighCVE-2025-35963: Denial of Service in Intel(R) PROSet/Wireless WiFi Software for Windows
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.