CVE-2025-5879: Cross Site Scripting in WuKongOpenSource WukongCRM
A vulnerability, which was classified as problematic, was found in WuKongOpenSource WukongCRM 9.0. This affects an unknown part of the file AdminSysConfigController.java of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5879 is a cross-site scripting (XSS) vulnerability identified in WuKongOpenSource's WukongCRM version 9.0. The vulnerability resides in the AdminSysConfigController.java file, specifically within the file upload component. The flaw arises from improper sanitization or validation of the 'File' argument, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although it does require some user interaction (UI:P). The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed. The impact on confidentiality is none, but there is a low impact on integrity and no impact on availability. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the exploit code is available, increasing the risk of exploitation. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. This XSS vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Given that WukongCRM is a customer relationship management system, exploitation could compromise sensitive customer data or internal business processes if combined with social engineering or phishing attacks targeting users of the CRM interface.
Potential Impact
For European organizations using WukongCRM 9.0, this vulnerability poses a moderate risk. Successful exploitation could lead to the compromise of user sessions, enabling attackers to impersonate legitimate users and access sensitive customer data or internal CRM functionalities. This could result in data breaches, loss of customer trust, and regulatory non-compliance, especially under GDPR requirements. The XSS vulnerability could also be leveraged to deliver further malware or phishing payloads within the corporate network. Since the vulnerability requires user interaction, the risk is somewhat mitigated by user awareness, but the public availability of exploit code increases the likelihood of targeted attacks. Organizations relying on WukongCRM for customer data management or sales operations may face operational disruptions and reputational damage if exploited.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the file upload parameter in WukongCRM. 2) Conduct thorough input validation and output encoding on the server side where possible, or implement reverse proxies that sanitize inputs to the vulnerable endpoint. 3) Restrict access to the AdminSysConfigController interface to trusted IP ranges or VPN-only access to reduce exposure. 4) Educate users about the risks of interacting with untrusted links or content within the CRM interface to reduce the likelihood of successful user interaction exploitation. 5) Monitor logs for unusual activity related to file uploads or script injections. 6) Plan for an upgrade or migration to a patched or alternative CRM solution once available, as the vendor has not responded to the vulnerability disclosure. 7) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the CRM.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-5879: Cross Site Scripting in WuKongOpenSource WukongCRM
Description
A vulnerability, which was classified as problematic, was found in WuKongOpenSource WukongCRM 9.0. This affects an unknown part of the file AdminSysConfigController.java of the component File Upload. The manipulation of the argument File leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5879 is a cross-site scripting (XSS) vulnerability identified in WuKongOpenSource's WukongCRM version 9.0. The vulnerability resides in the AdminSysConfigController.java file, specifically within the file upload component. The flaw arises from improper sanitization or validation of the 'File' argument, allowing an attacker to inject malicious scripts. This vulnerability can be exploited remotely without requiring authentication, although it does require some user interaction (UI:P). The CVSS 4.0 vector indicates that the attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:L), and user interaction needed. The impact on confidentiality is none, but there is a low impact on integrity and no impact on availability. The vulnerability has been publicly disclosed, and although no known exploits are currently reported in the wild, the exploit code is available, increasing the risk of exploitation. The vendor has not responded to the disclosure, and no patches or mitigations have been provided yet. This XSS vulnerability could allow attackers to execute arbitrary JavaScript in the context of the victim's browser, potentially leading to session hijacking, defacement, or redirection to malicious sites. Given that WukongCRM is a customer relationship management system, exploitation could compromise sensitive customer data or internal business processes if combined with social engineering or phishing attacks targeting users of the CRM interface.
Potential Impact
For European organizations using WukongCRM 9.0, this vulnerability poses a moderate risk. Successful exploitation could lead to the compromise of user sessions, enabling attackers to impersonate legitimate users and access sensitive customer data or internal CRM functionalities. This could result in data breaches, loss of customer trust, and regulatory non-compliance, especially under GDPR requirements. The XSS vulnerability could also be leveraged to deliver further malware or phishing payloads within the corporate network. Since the vulnerability requires user interaction, the risk is somewhat mitigated by user awareness, but the public availability of exploit code increases the likelihood of targeted attacks. Organizations relying on WukongCRM for customer data management or sales operations may face operational disruptions and reputational damage if exploited.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement several specific mitigations: 1) Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious payloads targeting the file upload parameter in WukongCRM. 2) Conduct thorough input validation and output encoding on the server side where possible, or implement reverse proxies that sanitize inputs to the vulnerable endpoint. 3) Restrict access to the AdminSysConfigController interface to trusted IP ranges or VPN-only access to reduce exposure. 4) Educate users about the risks of interacting with untrusted links or content within the CRM interface to reduce the likelihood of successful user interaction exploitation. 5) Monitor logs for unusual activity related to file uploads or script injections. 6) Plan for an upgrade or migration to a patched or alternative CRM solution once available, as the vendor has not responded to the vulnerability disclosure. 7) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the CRM.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-08T18:11:06.777Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6846e0147b622a9fdf246e89
Added to database: 6/9/2025, 1:22:28 PM
Last enriched: 7/9/2025, 2:12:36 PM
Last updated: 8/18/2025, 11:33:44 PM
Views: 45
Related Threats
CVE-2025-43739: CWE-203 Observable Discrepancy in Liferay Portal
MediumCVE-2025-8218: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
HighCVE-2025-6758: CWE-269 Improper Privilege Management in imithemes Real Spaces - WordPress Properties Directory Theme
CriticalCVE-2025-54336: n/a
CriticalCVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.