Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60828: n/a

0
Medium
VulnerabilityCVE-2025-60828cvecve-2025-60828
Published: Wed Oct 08 2025 (10/08/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

WukongCRM-9.0-JAVA was discovered to contain a fastjson deserialization vulnerability via the /OaExamine/setOaExamine interface.

AI-Powered Analysis

AILast updated: 10/08/2025, 14:05:24 UTC

Technical Analysis

CVE-2025-60828 identifies a critical deserialization vulnerability in WukongCRM version 9.0 implemented in Java. The vulnerability arises from the use of the fastjson library in the /OaExamine/setOaExamine API endpoint, which improperly handles deserialization of user-supplied data. Fastjson is a popular JSON parsing library, but unsafe deserialization can allow attackers to craft malicious payloads that, when processed, lead to arbitrary code execution or other unauthorized actions on the server. This vulnerability does not currently have a CVSS score or publicly known exploits, but the nature of deserialization flaws typically allows remote attackers to execute code without authentication if they can send crafted requests to the vulnerable endpoint. The lack of patch information suggests that a fix may not yet be publicly available, increasing the urgency for organizations to implement mitigations. The vulnerability affects all deployments of WukongCRM-9.0-JAVA that expose the vulnerable interface and use fastjson without proper security controls. Given the criticality of CRM systems in managing sensitive business data, exploitation could lead to data breaches, system compromise, and disruption of business operations.

Potential Impact

For European organizations, exploitation of this vulnerability could result in unauthorized access to sensitive customer and business data managed within WukongCRM, leading to data confidentiality breaches and potential regulatory non-compliance under GDPR. Integrity of CRM data could be compromised, affecting business decisions and customer relations. Availability impacts could arise if attackers execute destructive payloads or disrupt CRM services, causing operational downtime. The vulnerability's remote exploitation potential without authentication increases risk, especially for organizations exposing the vulnerable interface to external networks. Industries relying heavily on CRM systems, such as finance, retail, and professional services, may face heightened risks. Additionally, reputational damage and financial losses from incident response and remediation efforts could be significant. The absence of known exploits currently provides a window for proactive defense, but the threat landscape may evolve rapidly.

Mitigation Recommendations

Organizations should immediately audit their WukongCRM deployments to identify exposure of the /OaExamine/setOaExamine interface. Until a patch is available, restrict access to this endpoint through network segmentation, firewall rules, or VPN requirements to limit exposure to trusted users only. Implement input validation and sanitization on all data submitted to the vulnerable interface to prevent malicious payloads. Upgrade or patch the fastjson library to a version that includes deserialization security improvements once available. Employ runtime application self-protection (RASP) or web application firewalls (WAF) with custom rules to detect and block suspicious deserialization patterns. Monitor logs for anomalous activity targeting the vulnerable endpoint. Conduct security awareness training for developers and administrators on secure deserialization practices. Finally, establish an incident response plan specific to deserialization attacks to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68e66bf75e259e903d950565

Added to database: 10/8/2025, 1:49:43 PM

Last enriched: 10/8/2025, 2:05:24 PM

Last updated: 10/9/2025, 12:24:29 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats