Skip to main content

CVE-2025-5005: Server-Side Request Forgery in Shanghai Lingdang Information Technology Lingdang CRM

Medium
VulnerabilityCVE-2025-5005cvecve-2025-5005
Published: Tue Sep 09 2025 (09/09/2025, 16:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Lingdang Information Technology
Product: Lingdang CRM

Description

A vulnerability was detected in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.5.4. This affects an unknown function of the file crm/WeiXinApp/dingtalk/index_event.php. The manipulation of the argument corpurl results in server-side request forgery. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/09/2025, 16:44:39 UTC

Technical Analysis

CVE-2025-5005 is a Server-Side Request Forgery (SSRF) vulnerability identified in Shanghai Lingdang Information Technology's Lingdang CRM product, specifically affecting versions up to 8.6.5.4. The vulnerability resides in the crm/WeiXinApp/dingtalk/index_event.php file, where the 'corpurl' argument can be manipulated by an attacker. SSRF vulnerabilities allow an attacker to make the vulnerable server send crafted requests to internal or external systems, potentially bypassing firewall restrictions and accessing sensitive internal resources. This vulnerability can be exploited remotely without authentication or user interaction, increasing its risk profile. The vendor has been contacted but has not responded or provided a patch, and a public exploit is available, which raises the urgency for mitigation. The CVSS v4.0 base score is 6.9 (medium severity), reflecting network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality, integrity, and availability. However, the vulnerability's exploitation could lead to unauthorized internal network scanning, data exfiltration, or pivoting attacks depending on the internal network architecture and the CRM deployment environment. Since Lingdang CRM is a customer relationship management system, it likely handles sensitive business and client data, increasing the potential impact of exploitation.

Potential Impact

For European organizations using Lingdang CRM, this SSRF vulnerability could lead to significant risks. Attackers exploiting this flaw could access internal services that are otherwise protected, potentially exposing sensitive customer data, internal APIs, or administrative interfaces. This could result in data breaches, unauthorized access to internal systems, or lateral movement within the corporate network. Given the CRM's role in managing client information, exploitation could compromise confidentiality and integrity of business-critical data. Additionally, if the CRM is integrated with other enterprise systems or cloud services, SSRF could be leveraged to attack those linked systems. The lack of vendor response and patch availability increases the window of exposure. European organizations in sectors with strict data protection regulations (e.g., GDPR) face compliance risks and potential financial penalties if this vulnerability leads to data leakage. Furthermore, the remote and unauthenticated nature of the exploit means attackers can launch attacks from anywhere, increasing the threat landscape for European entities.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include: 1) Network-level restrictions: Implement strict egress filtering on the CRM server to limit outbound HTTP/HTTPS requests only to trusted destinations, preventing SSRF exploitation from reaching internal services. 2) Web application firewall (WAF): Deploy or update WAF rules to detect and block suspicious requests targeting the 'corpurl' parameter or unusual outbound request patterns. 3) Input validation: If possible, apply custom input validation or sanitization on the 'corpurl' parameter to restrict URLs to a whitelist of allowed domains or reject external/internal IP addresses. 4) Monitoring and logging: Enhance logging on the CRM server and network perimeter to detect anomalous outbound requests or repeated access attempts to the vulnerable endpoint. 5) Network segmentation: Isolate the CRM server from sensitive internal systems to minimize potential lateral movement. 6) Incident response readiness: Prepare to respond to potential exploitation attempts by having forensic and containment procedures in place. Organizations should also actively monitor for vendor updates or third-party patches and plan for prompt application once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-05-20T13:22:16.157Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68c05927ffcb452a184a8c59

Added to database: 9/9/2025, 4:43:19 PM

Last enriched: 9/9/2025, 4:44:39 PM

Last updated: 9/9/2025, 5:22:38 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats