CVE-2025-7874: Information Disclosure in Metasoft 美特软件 MetaCRM
A vulnerability was found in Metasoft 美特软件 MetaCRM up to 6.4.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /env.jsp. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7874 is an information disclosure vulnerability identified in Metasoft 美特软件's MetaCRM product, specifically affecting versions 6.4.0 through 6.4.2. The vulnerability resides in an unspecified functionality within the /env.jsp file. This flaw allows an unauthenticated remote attacker to access sensitive information without requiring any user interaction or privileges. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (VC:L), with no impact on integrity or availability. The vulnerability is exploitable remotely and the exploit details have been publicly disclosed, although there are no confirmed reports of exploitation in the wild. The vendor has been contacted but has not responded or provided a patch, leaving affected users exposed. The lack of a patch and public exploit disclosure increases the risk of exploitation by threat actors seeking to gather sensitive information from vulnerable MetaCRM deployments.
Potential Impact
For European organizations using MetaCRM versions 6.4.0 to 6.4.2, this vulnerability poses a significant risk of unauthorized information disclosure. The leaked information could include environment variables, configuration details, or other sensitive data accessible via the /env.jsp endpoint, potentially exposing credentials, internal network details, or other confidential business information. Such data exposure can facilitate further attacks such as lateral movement, privilege escalation, or targeted phishing campaigns. Given that MetaCRM is a customer relationship management system, the exposure of customer data or internal business intelligence could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. The medium severity rating reflects that while the vulnerability does not directly impact system integrity or availability, the confidentiality breach alone can have serious consequences, especially in regulated industries or sectors handling sensitive personal data.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include restricting network access to the MetaCRM application, especially the /env.jsp endpoint, by using web application firewalls (WAFs) or network segmentation to limit exposure to trusted internal users only. Conduct thorough audits of MetaCRM installations to identify affected versions and remove or disable the vulnerable /env.jsp file if feasible. Monitor logs for unusual access patterns targeting this endpoint. Employ strict access controls and ensure that sensitive configuration data is not stored or exposed in web-accessible files. Organizations should also consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts. Finally, maintain heightened vigilance for phishing or follow-on attacks that may leverage information obtained through this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7874: Information Disclosure in Metasoft 美特软件 MetaCRM
Description
A vulnerability was found in Metasoft 美特软件 MetaCRM up to 6.4.2. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /env.jsp. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7874 is an information disclosure vulnerability identified in Metasoft 美特软件's MetaCRM product, specifically affecting versions 6.4.0 through 6.4.2. The vulnerability resides in an unspecified functionality within the /env.jsp file. This flaw allows an unauthenticated remote attacker to access sensitive information without requiring any user interaction or privileges. The vulnerability has a CVSS 4.0 base score of 6.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (VC:L), with no impact on integrity or availability. The vulnerability is exploitable remotely and the exploit details have been publicly disclosed, although there are no confirmed reports of exploitation in the wild. The vendor has been contacted but has not responded or provided a patch, leaving affected users exposed. The lack of a patch and public exploit disclosure increases the risk of exploitation by threat actors seeking to gather sensitive information from vulnerable MetaCRM deployments.
Potential Impact
For European organizations using MetaCRM versions 6.4.0 to 6.4.2, this vulnerability poses a significant risk of unauthorized information disclosure. The leaked information could include environment variables, configuration details, or other sensitive data accessible via the /env.jsp endpoint, potentially exposing credentials, internal network details, or other confidential business information. Such data exposure can facilitate further attacks such as lateral movement, privilege escalation, or targeted phishing campaigns. Given that MetaCRM is a customer relationship management system, the exposure of customer data or internal business intelligence could lead to reputational damage, regulatory non-compliance (e.g., GDPR violations), and financial losses. The medium severity rating reflects that while the vulnerability does not directly impact system integrity or availability, the confidentiality breach alone can have serious consequences, especially in regulated industries or sectors handling sensitive personal data.
Mitigation Recommendations
Since no official patch or vendor response is available, European organizations should implement compensating controls immediately. These include restricting network access to the MetaCRM application, especially the /env.jsp endpoint, by using web application firewalls (WAFs) or network segmentation to limit exposure to trusted internal users only. Conduct thorough audits of MetaCRM installations to identify affected versions and remove or disable the vulnerable /env.jsp file if feasible. Monitor logs for unusual access patterns targeting this endpoint. Employ strict access controls and ensure that sensitive configuration data is not stored or exposed in web-accessible files. Organizations should also consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts. Finally, maintain heightened vigilance for phishing or follow-on attacks that may leverage information obtained through this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T07:15:31.019Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687c97b8a83201eaac015f29
Added to database: 7/20/2025, 7:16:08 AM
Last enriched: 7/20/2025, 7:31:08 AM
Last updated: 7/20/2025, 7:31:08 AM
Views: 2
Related Threats
CVE-2025-7878: Unrestricted Upload in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7877: Unrestricted Upload in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7875: Improper Authentication in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7873: SQL Injection in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7872: Cross Site Scripting in Portabilis i-Diario
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.