CVE-2025-7877: Unrestricted Upload in Metasoft 美特软件 MetaCRM
A vulnerability, which was classified as critical, has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This issue affects some unknown processing of the file sendfile.jsp. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-7877 is a vulnerability identified in Metasoft 美特软件 MetaCRM versions up to 6.4.2. The issue resides in the file sendfile.jsp, where improper handling of the 'File' argument allows an attacker to perform an unrestricted file upload. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability's exploitation could allow an attacker to upload arbitrary files, potentially leading to remote code execution, data compromise, or system takeover depending on the server configuration and the nature of the uploaded files. Despite being classified as critical by the initial report, the official CVSS 4.0 score is 5.3 (medium severity), reflecting some mitigating factors such as limited scope and the requirement for low privileges (PR:L). The vendor has not responded to the disclosure, and no patches or mitigations have been officially released. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability affects the MetaCRM product, a customer relationship management system, which is likely used in enterprise environments for managing customer data and business processes. The unrestricted upload flaw in a web-accessible JSP file is a significant risk vector, as it can be leveraged to bypass security controls and deploy malicious payloads on the server.
Potential Impact
For European organizations using MetaCRM, this vulnerability poses a risk to confidentiality, integrity, and availability of their CRM systems and associated data. Successful exploitation could lead to unauthorized access to sensitive customer information, disruption of business operations, and potential lateral movement within the corporate network. Given that CRM systems often contain personal data protected under GDPR, a breach could result in regulatory penalties and reputational damage. The medium CVSS score suggests some limitations in exploitability or impact, but the lack of vendor response and patches increases exposure. Organizations in sectors such as finance, retail, and services that rely on MetaCRM for customer management are particularly vulnerable. Additionally, the remote and unauthenticated nature of the attack vector means that attackers can attempt exploitation over the internet, increasing the threat surface. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code may be developed following public disclosure.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of MetaCRM versions 6.4.0 through 6.4.2. In the absence of official patches, organizations should consider the following mitigations: 1) Restrict access to the sendfile.jsp endpoint via network-level controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure to trusted users only. 2) Implement strict input validation and file type restrictions at the web server or proxy level to prevent unauthorized file uploads. 3) Monitor web server logs for unusual file upload attempts or access patterns targeting sendfile.jsp. 4) Employ runtime application self-protection (RASP) tools if available to detect and block malicious upload attempts. 5) Isolate the MetaCRM server within a segmented network zone with minimal privileges to reduce lateral movement risk. 6) Prepare incident response plans for potential exploitation scenarios, including forensic readiness and data breach notification procedures. 7) Engage with Metasoft or third-party security providers for potential unofficial patches or workarounds. 8) Consider temporary suspension or replacement of MetaCRM if critical business processes can be maintained by alternative solutions until a patch is available.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-7877: Unrestricted Upload in Metasoft 美特软件 MetaCRM
Description
A vulnerability, which was classified as critical, has been found in Metasoft 美特软件 MetaCRM up to 6.4.2. This issue affects some unknown processing of the file sendfile.jsp. The manipulation of the argument File leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-7877 is a vulnerability identified in Metasoft 美特软件 MetaCRM versions up to 6.4.2. The issue resides in the file sendfile.jsp, where improper handling of the 'File' argument allows an attacker to perform an unrestricted file upload. This vulnerability can be exploited remotely without requiring user interaction or authentication, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:L). The vulnerability's exploitation could allow an attacker to upload arbitrary files, potentially leading to remote code execution, data compromise, or system takeover depending on the server configuration and the nature of the uploaded files. Despite being classified as critical by the initial report, the official CVSS 4.0 score is 5.3 (medium severity), reflecting some mitigating factors such as limited scope and the requirement for low privileges (PR:L). The vendor has not responded to the disclosure, and no patches or mitigations have been officially released. No known exploits are currently observed in the wild, but public disclosure increases the risk of exploitation attempts. The vulnerability affects the MetaCRM product, a customer relationship management system, which is likely used in enterprise environments for managing customer data and business processes. The unrestricted upload flaw in a web-accessible JSP file is a significant risk vector, as it can be leveraged to bypass security controls and deploy malicious payloads on the server.
Potential Impact
For European organizations using MetaCRM, this vulnerability poses a risk to confidentiality, integrity, and availability of their CRM systems and associated data. Successful exploitation could lead to unauthorized access to sensitive customer information, disruption of business operations, and potential lateral movement within the corporate network. Given that CRM systems often contain personal data protected under GDPR, a breach could result in regulatory penalties and reputational damage. The medium CVSS score suggests some limitations in exploitability or impact, but the lack of vendor response and patches increases exposure. Organizations in sectors such as finance, retail, and services that rely on MetaCRM for customer management are particularly vulnerable. Additionally, the remote and unauthenticated nature of the attack vector means that attackers can attempt exploitation over the internet, increasing the threat surface. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as exploit code may be developed following public disclosure.
Mitigation Recommendations
European organizations should immediately conduct an inventory to identify any deployments of MetaCRM versions 6.4.0 through 6.4.2. In the absence of official patches, organizations should consider the following mitigations: 1) Restrict access to the sendfile.jsp endpoint via network-level controls such as web application firewalls (WAFs) or IP whitelisting to limit exposure to trusted users only. 2) Implement strict input validation and file type restrictions at the web server or proxy level to prevent unauthorized file uploads. 3) Monitor web server logs for unusual file upload attempts or access patterns targeting sendfile.jsp. 4) Employ runtime application self-protection (RASP) tools if available to detect and block malicious upload attempts. 5) Isolate the MetaCRM server within a segmented network zone with minimal privileges to reduce lateral movement risk. 6) Prepare incident response plans for potential exploitation scenarios, including forensic readiness and data breach notification procedures. 7) Engage with Metasoft or third-party security providers for potential unofficial patches or workarounds. 8) Consider temporary suspension or replacement of MetaCRM if critical business processes can be maintained by alternative solutions until a patch is available.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-07-19T07:15:39.022Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 687ca5c8a83201eaac0187fa
Added to database: 7/20/2025, 8:16:08 AM
Last enriched: 7/20/2025, 8:31:14 AM
Last updated: 7/20/2025, 8:31:14 AM
Views: 2
Related Threats
CVE-2025-7880: Unrestricted Upload in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7879: Unrestricted Upload in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7878: Unrestricted Upload in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7875: Improper Authentication in Metasoft 美特软件 MetaCRM
MediumCVE-2025-7874: Information Disclosure in Metasoft 美特软件 MetaCRM
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.