Skip to main content

CVE-2025-7915: SQL Injection in Chanjet CRM

Medium
VulnerabilityCVE-2025-7915cvecve-2025-7915
Published: Mon Jul 21 2025 (07/21/2025, 00:32:04 UTC)
Source: CVE Database V5
Vendor/Project: Chanjet
Product: CRM

Description

A vulnerability was found in Chanjet CRM 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /mail/mailinactive.php of the component Login Page. The manipulation leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

AILast updated: 07/21/2025, 01:01:16 UTC

Technical Analysis

CVE-2025-7915 is a SQL Injection vulnerability identified in Chanjet CRM version 1.0, specifically within the /mail/mailinactive.php file, which is part of the Login Page component. SQL Injection vulnerabilities occur when untrusted input is improperly sanitized and directly included in SQL queries, allowing attackers to manipulate the database queries executed by the application. In this case, the vulnerability allows remote attackers to inject malicious SQL code without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:N/UI:N). The vulnerability impacts confidentiality, integrity, and availability of the database, albeit with limited scope and impact (VC:L/VI:L/VA:L). The CVSS score of 6.9 (medium severity) reflects that while the attack is relatively easy to execute remotely, the overall impact is limited compared to more severe SQL injection flaws. The vulnerability affects an unknown functionality within the mailinactive.php script, which likely handles inactive mail or notification features related to user login. Exploitation could allow attackers to extract sensitive data, modify or delete records, or disrupt CRM operations. Although no public exploits are currently known in the wild, the vulnerability has been publicly disclosed, increasing the risk of exploitation by opportunistic attackers. No patches or fixes have been linked yet, indicating that organizations using Chanjet CRM 1.0 remain vulnerable until remediation is available or mitigations are applied.

Potential Impact

For European organizations using Chanjet CRM 1.0, this vulnerability poses a risk to the confidentiality and integrity of customer and business data stored within the CRM system. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service conditions affecting CRM availability. This could disrupt business operations, damage customer trust, and lead to regulatory compliance issues under GDPR due to potential data breaches. The remote and unauthenticated nature of the vulnerability increases the likelihood of exploitation, especially if the CRM is exposed to the internet or accessible by external parties. Organizations in sectors relying heavily on CRM data for customer management, sales, and support—such as finance, retail, and professional services—may face operational and reputational damage. However, the limited scope and impact ratings suggest that while serious, the vulnerability may not lead to full system compromise or widespread data loss without additional chained exploits.

Mitigation Recommendations

1. Immediate mitigation should include restricting external access to the Chanjet CRM login page and the /mail/mailinactive.php endpoint via network controls such as firewalls or VPNs to limit exposure. 2. Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the affected endpoint. 3. Conduct input validation and sanitization on all parameters processed by mailinactive.php to prevent injection of malicious SQL code. 4. Monitor application logs for suspicious query patterns or repeated failed login attempts that could indicate exploitation attempts. 5. Engage with Chanjet vendor support to obtain official patches or updates addressing this vulnerability as soon as they become available. 6. If patching is delayed, consider temporary code-level mitigations such as parameterized queries or prepared statements in the affected script. 7. Perform regular security assessments and penetration testing focused on the CRM application to identify and remediate similar injection flaws. 8. Educate IT and security teams on the risks of SQL injection and the importance of secure coding practices to prevent future vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-19T19:25:47.560Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 687d8dcea83201eaac05f84a

Added to database: 7/21/2025, 12:46:06 AM

Last enriched: 7/21/2025, 1:01:16 AM

Last updated: 7/21/2025, 8:32:34 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats