CVE-2025-7801: SQL Injection in BossSoft CRM
A vulnerability has been found in BossSoft CRM 6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The manipulation of the argument cstid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI Analysis
Technical Summary
CVE-2025-7801 is a critical SQL Injection vulnerability identified in BossSoft CRM version 6.0, specifically within the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The vulnerability arises from improper sanitization of the 'cstid' parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL commands. This flaw allows an attacker to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the CRM database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction, and causing low to medium impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects an unknown functionality within the specified JSP file, which suggests that the affected feature might be a custom or less documented search or query function within the CRM. Given the nature of SQL Injection, attackers could leverage this to extract sensitive customer data, modify records, or disrupt CRM operations, which are critical for business processes and customer relationship management.
Potential Impact
For European organizations using BossSoft CRM 6.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Compromise of CRM data can lead to exposure of personally identifiable information (PII), trade secrets, and strategic business information, which may violate GDPR and other data protection regulations, resulting in legal and financial penalties. Additionally, disruption or manipulation of CRM data can impair sales, marketing, and customer support functions, causing operational downtime and reputational damage. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers can attempt exploitation without needing internal access or user interaction. Organizations in sectors with high regulatory scrutiny or handling sensitive customer data, such as finance, healthcare, and telecommunications, are particularly vulnerable. The medium CVSS score reflects moderate impact, but the critical classification by the vendor and the public disclosure of exploit details warrant urgent attention.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit of their BossSoft CRM 6.0 deployments to identify exposure to the vulnerable JSP endpoint. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL Injection attempts targeting the 'cstid' parameter, including patterns of SQL syntax and anomalous input lengths or characters. 2) Employ input validation and sanitization at the application layer, if source code access is possible, to enforce strict parameter type and length constraints. 3) Restrict network access to the CRM application to trusted IP ranges and enforce VPN or zero-trust access models to reduce exposure. 4) Monitor CRM logs for unusual query patterns or errors indicative of injection attempts. 5) Prepare for rapid patch deployment by maintaining close contact with BossSoft for forthcoming security updates. 6) Conduct internal penetration testing focusing on the vulnerable endpoint to assess exploitability and impact. 7) Educate IT and security teams about this vulnerability to ensure timely detection and response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-7801: SQL Injection in BossSoft CRM
Description
A vulnerability has been found in BossSoft CRM 6.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The manipulation of the argument cstid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
AI-Powered Analysis
Technical Analysis
CVE-2025-7801 is a critical SQL Injection vulnerability identified in BossSoft CRM version 6.0, specifically within the file /crm/module/HNDCBas_customPrmSearchDtl.jsp. The vulnerability arises from improper sanitization of the 'cstid' parameter, which can be manipulated remotely without authentication or user interaction to inject malicious SQL commands. This flaw allows an attacker to interfere with the backend database queries, potentially leading to unauthorized data access, data modification, or even complete compromise of the CRM database. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level, with an attack vector that is network-based, requiring no privileges or user interaction, and causing low to medium impact on confidentiality, integrity, and availability. Although no public exploits are currently known to be in the wild, the exploit details have been disclosed publicly, increasing the risk of exploitation. The vulnerability affects an unknown functionality within the specified JSP file, which suggests that the affected feature might be a custom or less documented search or query function within the CRM. Given the nature of SQL Injection, attackers could leverage this to extract sensitive customer data, modify records, or disrupt CRM operations, which are critical for business processes and customer relationship management.
Potential Impact
For European organizations using BossSoft CRM 6.0, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Compromise of CRM data can lead to exposure of personally identifiable information (PII), trade secrets, and strategic business information, which may violate GDPR and other data protection regulations, resulting in legal and financial penalties. Additionally, disruption or manipulation of CRM data can impair sales, marketing, and customer support functions, causing operational downtime and reputational damage. The remote and unauthenticated nature of the exploit increases the threat landscape, as attackers can attempt exploitation without needing internal access or user interaction. Organizations in sectors with high regulatory scrutiny or handling sensitive customer data, such as finance, healthcare, and telecommunications, are particularly vulnerable. The medium CVSS score reflects moderate impact, but the critical classification by the vendor and the public disclosure of exploit details warrant urgent attention.
Mitigation Recommendations
European organizations should immediately conduct a thorough audit of their BossSoft CRM 6.0 deployments to identify exposure to the vulnerable JSP endpoint. Since no official patches are currently available, organizations should implement the following specific mitigations: 1) Apply Web Application Firewall (WAF) rules tailored to detect and block SQL Injection attempts targeting the 'cstid' parameter, including patterns of SQL syntax and anomalous input lengths or characters. 2) Employ input validation and sanitization at the application layer, if source code access is possible, to enforce strict parameter type and length constraints. 3) Restrict network access to the CRM application to trusted IP ranges and enforce VPN or zero-trust access models to reduce exposure. 4) Monitor CRM logs for unusual query patterns or errors indicative of injection attempts. 5) Prepare for rapid patch deployment by maintaining close contact with BossSoft for forthcoming security updates. 6) Conduct internal penetration testing focusing on the vulnerable endpoint to assess exploitability and impact. 7) Educate IT and security teams about this vulnerability to ensure timely detection and response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-18T08:57:39.674Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687a99f8a83201eaacf5972d
Added to database: 7/18/2025, 7:01:12 PM
Last enriched: 7/26/2025, 12:55:20 AM
Last updated: 11/16/2025, 11:46:14 AM
Views: 76
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13249: Unrestricted Upload in Jiusi OA
MediumCVE-2025-13248: SQL Injection in SourceCodester Patients Waiting Area Queue Management System
MediumCVE-2025-13247: SQL Injection in PHPGurukul Tourism Management System
MediumCVE-2025-13246: Path Traversal in shsuishang ShopSuite ModulithShop
MediumCVE-2025-13245: Cross Site Scripting in code-projects Student Information System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.