CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
AI Analysis
Technical Summary
CVE-2025-9140 is a medium severity SQL Injection vulnerability affecting Shanghai Lingdang Information Technology's Lingdang CRM product, specifically versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring user interaction or elevated privileges, making it accessible to unauthenticated attackers with network access to the CRM system. The vulnerability arises from the failure to use parameterized queries and insufficient input validation, which enables attackers to manipulate backend database queries. Exploitation could lead to unauthorized data access, data modification, or even deletion, compromising the confidentiality, integrity, and availability of the CRM database. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation balanced against the limited scope and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Lingdang CRM versions up to 8.6.4.7, this vulnerability poses a significant risk to sensitive customer and business data stored within the CRM system. Successful exploitation could lead to unauthorized data disclosure, alteration of customer records, or disruption of CRM services, impacting business operations and customer trust. Given that CRM systems often integrate with other enterprise applications, a compromise could facilitate lateral movement within the network, potentially exposing additional systems. The remote and unauthenticated nature of the attack vector increases the threat level, especially for organizations with externally accessible CRM portals. Compliance with GDPR and other data protection regulations in Europe means that data breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage. Organizations in sectors such as finance, healthcare, and retail, which rely heavily on CRM data, are particularly at risk.
Mitigation Recommendations
European organizations should immediately assess their Lingdang CRM deployments to identify affected versions. The primary mitigation is to upgrade all affected Lingdang CRM instances to version 8.6.5.4 or later, where the vulnerability has been patched through parameterized queries and input sanitization. Until upgrades can be applied, organizations should implement web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'getvaluestring' parameter. Network segmentation should be enforced to restrict external access to the CRM system, limiting exposure to trusted internal networks or VPN users only. Regular security audits and code reviews should be conducted to identify any other injection points. Additionally, monitoring and logging of database queries and web application logs should be enhanced to detect anomalous activities indicative of exploitation attempts. Backup procedures must be verified to ensure rapid recovery in case of data compromise.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
Description
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
AI-Powered Analysis
Technical Analysis
CVE-2025-9140 is a medium severity SQL Injection vulnerability affecting Shanghai Lingdang Information Technology's Lingdang CRM product, specifically versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring user interaction or elevated privileges, making it accessible to unauthenticated attackers with network access to the CRM system. The vulnerability arises from the failure to use parameterized queries and insufficient input validation, which enables attackers to manipulate backend database queries. Exploitation could lead to unauthorized data access, data modification, or even deletion, compromising the confidentiality, integrity, and availability of the CRM database. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation balanced against the limited scope and partial impact on confidentiality, integrity, and availability.
Potential Impact
For European organizations using Lingdang CRM versions up to 8.6.4.7, this vulnerability poses a significant risk to sensitive customer and business data stored within the CRM system. Successful exploitation could lead to unauthorized data disclosure, alteration of customer records, or disruption of CRM services, impacting business operations and customer trust. Given that CRM systems often integrate with other enterprise applications, a compromise could facilitate lateral movement within the network, potentially exposing additional systems. The remote and unauthenticated nature of the attack vector increases the threat level, especially for organizations with externally accessible CRM portals. Compliance with GDPR and other data protection regulations in Europe means that data breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage. Organizations in sectors such as finance, healthcare, and retail, which rely heavily on CRM data, are particularly at risk.
Mitigation Recommendations
European organizations should immediately assess their Lingdang CRM deployments to identify affected versions. The primary mitigation is to upgrade all affected Lingdang CRM instances to version 8.6.5.4 or later, where the vulnerability has been patched through parameterized queries and input sanitization. Until upgrades can be applied, organizations should implement web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'getvaluestring' parameter. Network segmentation should be enforced to restrict external access to the CRM system, limiting exposure to trusted internal networks or VPN users only. Regular security audits and code reviews should be conducted to identify any other injection points. Additionally, monitoring and logging of database queries and web application logs should be enhanced to detect anomalous activities indicative of exploitation attempts. Backup procedures must be verified to ensure rapid recovery in case of data compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T05:44:18.399Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a48084ad5a09ad00f82386
Added to database: 8/19/2025, 1:47:48 PM
Last enriched: 8/29/2025, 12:42:57 AM
Last updated: 10/2/2025, 6:47:06 PM
Views: 52
Related Threats
CVE-2025-9952: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-9886: CWE-352 Cross-Site Request Forgery (CSRF) in sergiotrinity Trinity Audio – Text to Speech AI audio player to convert content into audio
MediumCVE-2025-10383: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in contest-gallery Contest Gallery – Upload, Vote & Sell with PayPal and Stripe
MediumCVE-2025-61895
LowCVE-2025-61894
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.