CVE-2025-7801: SQL Injection in BossSoft CRM
A vulnerability has been found in BossSoft CRM 6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The manipulation of the argument cstid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7801 is a critical SQL Injection vulnerability identified in BossSoft CRM version 6.0, specifically within the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The vulnerability arises from improper sanitization of the 'cstid' parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL commands. This flaw allows an attacker to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the CRM database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction, and causing low to medium impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects an unknown functionality within the specified JSP file, which suggests that the affected feature might be a custom or less documented search or query function within the CRM. Given the nature of SQL Injection, attackers could leverage this to extract sensitive customer data, modify records, or disrupt CRM operations, which are critical for business processes and customer relationship management.
Potential Impact
For European organizations using BossSoft CRM 6.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Compromise of CRM data can lead to exposure of personally identifiable information (PII), trade secrets, and strategic business information, which may violate GDPR and other data protection regulations, resulting in legal and financial penalties. Additionally, disruption or manipulation of CRM data can impair sales, marketing, and customer support functions, causing operational downtime and reputational damage. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers can attempt exploitation without needing internal access or user interaction. Organizations in sectors with high regulatory scrutiny or handling sensitive customer data, such as finance, healthcare, and telecommunications, are particularly vulnerable. The medium CVSS score reflects moderate impact, but the critical classification by the vendor and the public disclosure of exploit details warrant urgent attention.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit of their BossSoft CRM 6.0 deployments to identify exposure to the vulnerable JSP endpoint. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL Injection attempts targeting the 'cstid' parameter, including patterns of SQL syntax and anomalous input lengths or characters. 2) Employ input validation and sanitization at the application layer, if source code access is possible, to enforce strict parameter type and length constraints. 3) Restrict network access to the CRM application to trusted IP ranges and enforce VPN or zero-trust access models to reduce exposure. 4) Monitor CRM logs for unusual query patterns or errors indicative of injection attempts. 5) Prepare for rapid patch deployment by maintaining close contact with BossSoft for forthcoming security updates. 6) Conduct internal penetration testing focusing on the vulnerable endpoint to assess exploitability and impact. 7) Educate IT and security teams about this vulnerability to ensure timely detection and response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-7801: SQL Injection in BossSoft CRM
Description
A vulnerability has been found in BossSoft CRM 6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The manipulation of the argument cstid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7801 is a critical SQL Injection vulnerability identified in BossSoft CRM version 6.0, specifically within the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The vulnerability arises from improper sanitization of the 'cstid' parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL commands. This flaw allows an attacker to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the CRM database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction, and causing low to medium impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects an unknown functionality within the specified JSP file, which suggests that the affected feature might be a custom or less documented search or query function within the CRM. Given the nature of SQL Injection, attackers could leverage this to extract sensitive customer data, modify records, or disrupt CRM operations, which are critical for business processes and customer relationship management.
Potential Impact
For European organizations using BossSoft CRM 6.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Compromise of CRM data can lead to exposure of personally identifiable information (PII), trade secrets, and strategic business information, which may violate GDPR and other data protection regulations, resulting in legal and financial penalties. Additionally, disruption or manipulation of CRM data can impair sales, marketing, and customer support functions, causing operational downtime and reputational damage. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers can attempt exploitation without needing internal access or user interaction. Organizations in sectors with high regulatory scrutiny or handling sensitive customer data, such as finance, healthcare, and telecommunications, are particularly vulnerable. The medium CVSS score reflects moderate impact, but the critical classification by the vendor and the public disclosure of exploit details warrant urgent attention.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit of their BossSoft CRM 6.0 deployments to identify exposure to the vulnerable JSP endpoint. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL Injection attempts targeting the 'cstid' parameter, including patterns of SQL syntax and anomalous input lengths or characters. 2) Employ input validation and sanitization at the application layer, if source code access is possible, to enforce strict parameter type and length constraints. 3) Restrict network access to the CRM application to trusted IP ranges and enforce VPN or zero-trust access models to reduce exposure. 4) Monitor CRM logs for unusual query patterns or errors indicative of injection attempts. 5) Prepare for rapid patch deployment by maintaining close contact with BossSoft for forthcoming security updates. 6) Conduct internal penetration testing focusing on the vulnerable endpoint to assess exploitability and impact. 7) Educate IT and security teams about this vulnerability to ensure timely detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T08:57:39.674Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a99f8a83201eaacf5972d
Added to database: 7/18/2025, 7:01:12 PM
Last enriched: 7/26/2025, 12:55:20 AM
Last updated: 8/16/2025, 11:44:14 AM
Views: 20
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.