Skip to main content

CVE-2025-8219: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM

Medium
VulnerabilityCVE-2025-8219cvecve-2025-8219
Published: Sun Jul 27 2025 (07/27/2025, 02:02:04 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Lingdang Information Technology
Product: Lingdang CRM

Description

A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. It has been rated as critical. This issue affects some unknown processing of the file /crm/crmapi/erp/tabdetail_moduleSave_dxkp.php of the component HTTP POST Request Handler. The manipulation of the argument getvaluestring leads to sql injection. The attack may be initiated remotely. Upgrading to version 8.6.5.2 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+. We strongly advise all customers to upgrade to the current version (v8.6.5.2), which includes this fix and additional security enhancements."

AI-Powered Analysis

AILast updated: 07/27/2025, 03:02:56 UTC

Technical Analysis

CVE-2025-8219 is a SQL Injection vulnerability identified in Shanghai Lingdang Information Technology's Lingdang CRM software versions up to 8.6.4.7. The vulnerability resides in the HTTP POST request handler for the endpoint /crm/crmapi/erp/tabdetail_moduleSave_dxkp.php, specifically in the processing of the 'getvaluestring' parameter. An attacker can manipulate this parameter to inject malicious SQL code, potentially allowing unauthorized access to or modification of the backend database. The vulnerability is exploitable remotely without user interaction and requires low privileges (PR:L), indicating that an attacker with limited access could exploit it. The vendor has addressed this issue in version 8.6.5.2 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. The CVSS 4.0 base score is 5.3 (medium severity), reflecting moderate impact on confidentiality, integrity, and availability, with no authentication or user interaction required. No known exploits are currently reported in the wild. This vulnerability could allow attackers to extract sensitive customer data, alter CRM records, or disrupt CRM operations, which are critical functions in customer relationship management systems.

Potential Impact

For European organizations using Lingdang CRM, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data. Successful exploitation could lead to unauthorized data disclosure, data tampering, or denial of service affecting CRM availability. Given that CRM systems often contain sensitive personal data subject to GDPR, exploitation could result in regulatory non-compliance, financial penalties, and reputational damage. The ability to exploit remotely without user interaction increases the risk of automated attacks or exploitation by external threat actors. Disruption or compromise of CRM data could impact sales, customer support, and business continuity. Organizations relying on Lingdang CRM for critical customer management functions must consider this vulnerability a priority for remediation to avoid operational and compliance risks.

Mitigation Recommendations

European organizations should immediately upgrade Lingdang CRM installations to version 8.6.5.2 or later, which includes patches for all SQL injection vectors and additional security enhancements. Until the upgrade is applied, organizations should implement strict input validation and sanitization at the web application firewall (WAF) or reverse proxy level to block malicious payloads targeting the 'getvaluestring' parameter. Monitoring and logging HTTP POST requests to the affected endpoint should be enhanced to detect suspicious activity. Access controls should be reviewed to limit exposure of the vulnerable endpoint to trusted networks or authenticated users where possible. Regular vulnerability scanning and penetration testing should be conducted to verify the absence of injection flaws. Additionally, organizations should ensure that database accounts used by the CRM have the minimum necessary privileges to limit potential damage from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-26T08:53:23.642Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6885934ead5a09ad006c6164

Added to database: 7/27/2025, 2:47:42 AM

Last enriched: 7/27/2025, 3:02:56 AM

Last updated: 7/31/2025, 12:34:33 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats