Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67968: Unrestricted Upload of File with Dangerous Type in InspiryThemes Real Homes CRM

0
Critical
VulnerabilityCVE-2025-67968cvecve-2025-67968
Published: Thu Jan 22 2026 (01/22/2026, 16:51:58 UTC)
Source: CVE Database V5
Vendor/Project: InspiryThemes
Product: Real Homes CRM

Description

Unrestricted Upload of File with Dangerous Type vulnerability in InspiryThemes Real Homes CRM realhomes-crm allows Using Malicious Files.This issue affects Real Homes CRM: from n/a through <= 1.0.0.

AI-Powered Analysis

AILast updated: 01/30/2026, 08:47:51 UTC

Technical Analysis

CVE-2025-67968 is a critical security vulnerability identified in InspiryThemes Real Homes CRM, a WordPress-based customer relationship management system tailored for real estate businesses. The vulnerability arises from an unrestricted file upload mechanism that fails to properly validate or restrict the types of files users can upload. This flaw allows an attacker with low-level privileges (PR:L) to upload malicious files, such as web shells or scripts, without requiring any user interaction (UI:N). The vulnerability has a network attack vector (AV:N), meaning exploitation can be attempted remotely over the internet. The scope is changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component, potentially compromising the entire system. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning attackers can steal sensitive data, alter or destroy data, and disrupt system operations. Although no public exploits have been reported yet, the vulnerability's nature and high CVSS score (9.9) suggest it is highly exploitable and dangerous. The affected versions include all releases up to and including 1.0.0, with no patch currently available. The vulnerability is particularly concerning because real estate CRMs often store sensitive client data, including personal and financial information, making them attractive targets for cybercriminals. The lack of file type restrictions means attackers can upload executable code, leading to remote code execution, privilege escalation, and full system compromise.

Potential Impact

For European organizations, especially those in the real estate sector using InspiryThemes Real Homes CRM, this vulnerability poses a significant risk. Successful exploitation can lead to unauthorized access to sensitive client data, including personal identification and financial details, resulting in data breaches and regulatory non-compliance under GDPR. The integrity of CRM data can be compromised, affecting business operations and client trust. Availability may also be impacted if attackers deploy ransomware or disrupt services, causing operational downtime. Given the critical nature of the vulnerability and the potential for remote exploitation without user interaction, attackers could leverage this flaw to establish persistent footholds within corporate networks. This could facilitate lateral movement and further attacks on connected systems. The reputational damage and financial losses from such incidents could be substantial, especially in highly regulated European markets.

Mitigation Recommendations

Organizations should immediately monitor for updates or patches from InspiryThemes and apply them as soon as they become available. In the absence of official patches, implement strict file upload controls by restricting allowed file types to safe formats (e.g., images only) and validating file contents server-side. Employ web application firewalls (WAFs) with rules to detect and block malicious file uploads and suspicious requests targeting the CRM. Limit user permissions to the minimum necessary, ensuring that only trusted users can upload files. Conduct regular security audits and penetration testing focused on file upload functionalities. Isolate the CRM environment from critical internal networks to contain potential breaches. Enable detailed logging and monitoring to detect anomalous activities related to file uploads. Educate staff about the risks of file upload vulnerabilities and enforce strong authentication mechanisms to reduce the risk of compromised accounts being used for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:23.853Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259174623b1157c7faed0

Added to database: 1/22/2026, 5:06:31 PM

Last enriched: 1/30/2026, 8:47:51 AM

Last updated: 2/7/2026, 6:47:55 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats