Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60375: n/a

0
High
VulnerabilityCVE-2025-60375cvecve-2025-60375
Published: Thu Oct 09 2025 (10/09/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-60375 is a high-severity authentication bypass vulnerability in Perfex CRM versions prior to 3. 3. 1. Due to insufficient server-side validation, attackers can send empty username and password parameters to bypass login and gain unauthorized access, including to administrative accounts. This flaw allows attackers to compromise confidentiality, integrity, and availability without any authentication or user interaction. There are no known exploits in the wild yet, but the vulnerability is easily exploitable remotely over the network. European organizations using vulnerable versions of Perfex CRM face significant risks of data breaches and operational disruption. Immediate patching or mitigation is critical to prevent unauthorized access. Countries with higher adoption of Perfex CRM and strategic targets in sectors like finance, government, and services are most at risk. The CVSS score is 7.

AI-Powered Analysis

AILast updated: 10/17/2025, 05:25:15 UTC

Technical Analysis

CVE-2025-60375 is an authentication bypass vulnerability affecting Perfex CRM versions before 3.3.1. The root cause is insufficient server-side validation of login credentials, specifically allowing empty username and password parameters to be accepted as valid. This flaw enables attackers to bypass the authentication mechanism entirely and gain unauthorized access to user accounts, including those with administrative privileges. The vulnerability is remotely exploitable over the network without requiring any prior authentication or user interaction, making it highly accessible to attackers. The CVSS 3.1 base score of 7.3 reflects a high severity due to the network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability corresponds to CWE-289, which involves improper authentication. Although no public exploits are currently known, the simplicity of the attack vector suggests that exploitation could be straightforward once the vulnerability is discovered. The lack of patch links indicates that organizations must rely on upgrading to Perfex CRM version 3.3.1 or later, where the issue is fixed. This vulnerability threatens the confidentiality, integrity, and availability of affected systems by allowing unauthorized data access and potential administrative control, which could lead to data theft, manipulation, or service disruption.

Potential Impact

For European organizations using vulnerable versions of Perfex CRM, this vulnerability poses a significant risk of unauthorized access to sensitive business data and administrative functions. Attackers exploiting this flaw can compromise customer information, internal communications, and operational data, leading to data breaches and potential regulatory non-compliance under GDPR. The ability to access administrative accounts increases the risk of further system compromise, including data manipulation, deletion, or deployment of malware. This can disrupt business operations, damage reputation, and incur financial losses. Sectors such as finance, government, healthcare, and professional services that rely on CRM systems for managing sensitive client data are particularly vulnerable. The remote and unauthenticated nature of the exploit means attackers can operate from anywhere, increasing the threat landscape. Additionally, the absence of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately upgrade Perfex CRM to version 3.3.1 or later, where the authentication bypass vulnerability is patched. 2. If upgrading is not immediately possible, implement network-level access controls such as IP whitelisting or VPN requirements to restrict access to the CRM login interface. 3. Deploy Web Application Firewalls (WAFs) with custom rules to detect and block login requests with empty or malformed credentials. 4. Enable and monitor detailed authentication logs to detect unusual login attempts, especially those with empty username or password fields. 5. Enforce multi-factor authentication (MFA) on all user accounts, particularly administrative accounts, to add an additional layer of security. 6. Conduct regular security audits and penetration testing focusing on authentication mechanisms. 7. Educate IT and security teams about this vulnerability to ensure rapid response to any suspicious activity. 8. Review and limit administrative privileges to the minimum necessary to reduce potential impact if compromised.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e820a9ba0e608b4facc8d9

Added to database: 10/9/2025, 8:52:57 PM

Last enriched: 10/17/2025, 5:25:15 AM

Last updated: 11/24/2025, 5:50:50 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats