CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
AI Analysis
Technical Summary
CVE-2025-9140 is a SQL Injection vulnerability identified in Shanghai Lingdang Information Technology's Lingdang CRM product, specifically affecting versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or elevated privileges, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability allows an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, a public exploit exists, increasing the risk of exploitation. The CVSS 4.0 score of 5.3 classifies this as a medium severity vulnerability, reflecting moderate impact on confidentiality, integrity, and availability with relatively low attack complexity but requiring some privileges.
Potential Impact
For European organizations using Lingdang CRM, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data managed within the CRM system. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even denial of service, potentially disrupting business operations and damaging trust with clients. Given that CRM systems often contain sensitive personal data subject to GDPR regulations, exploitation could also result in regulatory penalties and reputational harm. The remote exploitability without user interaction increases the threat level, especially for organizations with internet-facing CRM instances or insufficient network segmentation. The medium severity rating suggests that while the vulnerability is not critical, it is sufficiently serious to warrant prompt remediation to prevent data breaches and operational impact.
Mitigation Recommendations
European organizations should immediately upgrade Lingdang CRM installations to version 8.6.5.4 or later, where the vulnerability has been patched with parameterized queries and input sanitization. Until upgrades are completed, organizations should implement strict network controls to limit access to the CRM API endpoint, especially restricting external access to trusted IP addresses or VPN users. Web application firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting the 'getvaluestring' parameter. Regularly audit and monitor CRM logs for unusual query patterns or failed injection attempts. Additionally, conduct internal penetration testing focused on the CRM to identify any residual injection points. Organizations should also review and enforce the principle of least privilege for CRM user accounts to minimize the impact of potential exploitation. Finally, ensure that data backups are current and tested for recovery to mitigate potential data loss.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM
Description
A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."
AI-Powered Analysis
Technical Analysis
CVE-2025-9140 is a SQL Injection vulnerability identified in Shanghai Lingdang Information Technology's Lingdang CRM product, specifically affecting versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or elevated privileges, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability allows an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, a public exploit exists, increasing the risk of exploitation. The CVSS 4.0 score of 5.3 classifies this as a medium severity vulnerability, reflecting moderate impact on confidentiality, integrity, and availability with relatively low attack complexity but requiring some privileges.
Potential Impact
For European organizations using Lingdang CRM, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data managed within the CRM system. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even denial of service, potentially disrupting business operations and damaging trust with clients. Given that CRM systems often contain sensitive personal data subject to GDPR regulations, exploitation could also result in regulatory penalties and reputational harm. The remote exploitability without user interaction increases the threat level, especially for organizations with internet-facing CRM instances or insufficient network segmentation. The medium severity rating suggests that while the vulnerability is not critical, it is sufficiently serious to warrant prompt remediation to prevent data breaches and operational impact.
Mitigation Recommendations
European organizations should immediately upgrade Lingdang CRM installations to version 8.6.5.4 or later, where the vulnerability has been patched with parameterized queries and input sanitization. Until upgrades are completed, organizations should implement strict network controls to limit access to the CRM API endpoint, especially restricting external access to trusted IP addresses or VPN users. Web application firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting the 'getvaluestring' parameter. Regularly audit and monitor CRM logs for unusual query patterns or failed injection attempts. Additionally, conduct internal penetration testing focused on the CRM to identify any residual injection points. Organizations should also review and enforce the principle of least privilege for CRM user accounts to minimize the impact of potential exploitation. Finally, ensure that data backups are current and tested for recovery to mitigate potential data loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T05:44:18.399Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a48084ad5a09ad00f82386
Added to database: 8/19/2025, 1:47:48 PM
Last enriched: 8/19/2025, 2:03:40 PM
Last updated: 8/20/2025, 12:35:26 AM
Views: 5
Related Threats
CVE-2025-9132: Out of bounds write in Google Chrome
HighCVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
MediumCVE-2025-9176: OS Command Injection in neurobin shc
MediumCVE-2025-9175: Stack-based Buffer Overflow in neurobin shc
MediumCVE-2025-9174: OS Command Injection in neurobin shc
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.