Skip to main content

CVE-2025-5879: Cross Site Scripting in WuKongOpenSource WukongCRM

Medium
VulnerabilityCVE-2025-5879cvecve-2025-5879
Published: Mon Jun 09 2025 (06/09/2025, 13:00:16 UTC)
Source: CVE Database V5
Vendor/Project: WuKongOpenSource
Product: WukongCRM

Description

A vulnerability, which was classified as problematic, was found in WuKongOpenSource WukongCRM 9.0. This affects an unknown part of the file AdminSysConfigController.java of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/09/2025, 14:12:36 UTC

Technical Analysis

CVE-2025-5879 is a cross-site scripting (XSS) vulnerability identified in WuKongOpenSource's WukongCRM version 9.0. The vulnerability resides in the AdminSysConfigController.java file, specifically within the file upload component. The flaw arises from improper sanitization or validation of the 'File' argument, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although it does require some user interaction (UI:P). The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed. The impact on confidentiality is none, but there is a low impact on integrity and no impact on availability. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the exploit code is available, increasing the risk of exploitation. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. This XSS vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Given that WukongCRM is a customer relationship management system, exploitation could compromise sensitive customer data or internal business processes if combined with social engineering or phishing attacks targeting users of the CRM interface.

Potential Impact

For European organizations using WukongCRM 9.0, this vulnerability poses a moderate risk. Successful exploitation could lead to the compromise of user sessions, enabling attackers to impersonate legitimate users and access sensitive customer data or internal CRM functionalities. This could result in data breaches, loss of customer trust, and regulatory non-compliance, especially under GDPR requirements. The XSS vulnerability could also be leveraged to deliver further malware or phishing payloads within the corporate network. Since the vulnerability requires user interaction, the risk is somewhat mitigated by user awareness, but the public availability of exploit code increases the likelihood of targeted attacks. Organizations relying on WukongCRM for customer data management or sales operations may face operational disruptions and reputational damage if exploited.

Mitigation Recommendations

Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the file upload parameter in WukongCRM. 2) Conduct thorough input validation and output encoding on the server side where possible, or implement reverse proxies that sanitize inputs to the vulnerable endpoint. 3) Restrict access to the AdminSysConfigController interface to trusted IP ranges or VPN-only access to reduce exposure. 4) Educate users about the risks of interacting with untrusted links or content within the CRM interface to reduce the likelihood of successful user interaction exploitation. 5) Monitor logs for unusual activity related to file uploads or script injections. 6) Plan for an upgrade or migration to a patched or alternative CRM solution once available, as the vendor has not responded to the vulnerability disclosure. 7) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the CRM.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-06-08T18:11:06.777Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6846e0147b622a9fdf246e89

Added to database: 6/9/2025, 1:22:28 PM

Last enriched: 7/9/2025, 2:12:36 PM

Last updated: 8/18/2025, 11:33:44 PM

Views: 45

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats