Skip to main content

CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM

Medium
VulnerabilityCVE-2025-9140cvecve-2025-9140
Published: Tue Aug 19 2025 (08/19/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Lingdang Information Technology
Product: Lingdang CRM

Description

A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."

AI-Powered Analysis

AILast updated: 08/19/2025, 14:03:40 UTC

Technical Analysis

CVE-2025-9140 is a SQL Injection vulnerability identified in Shanghai Lingdang Information Technology's Lingdang CRM product, specifically affecting versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw enables remote exploitation without requiring user interaction or elevated privileges, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:N). The vulnerability allows an attacker to manipulate backend database queries, potentially leading to unauthorized data access, data modification, or disruption of service. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, a public exploit exists, increasing the risk of exploitation. The CVSS 4.0 score of 5.3 classifies this as a medium severity vulnerability, reflecting moderate impact on confidentiality, integrity, and availability with relatively low attack complexity but requiring some privileges.

Potential Impact

For European organizations using Lingdang CRM, this vulnerability poses a significant risk to the confidentiality and integrity of customer and business data managed within the CRM system. Successful exploitation could lead to unauthorized data disclosure, data tampering, or even denial of service, potentially disrupting business operations and damaging trust with clients. Given that CRM systems often contain sensitive personal data subject to GDPR regulations, exploitation could also result in regulatory penalties and reputational harm. The remote exploitability without user interaction increases the threat level, especially for organizations with internet-facing CRM instances or insufficient network segmentation. The medium severity rating suggests that while the vulnerability is not critical, it is sufficiently serious to warrant prompt remediation to prevent data breaches and operational impact.

Mitigation Recommendations

European organizations should immediately upgrade Lingdang CRM installations to version 8.6.5.4 or later, where the vulnerability has been patched with parameterized queries and input sanitization. Until upgrades are completed, organizations should implement strict network controls to limit access to the CRM API endpoint, especially restricting external access to trusted IP addresses or VPN users. Web application firewalls (WAFs) should be configured to detect and block SQL injection patterns targeting the 'getvaluestring' parameter. Regularly audit and monitor CRM logs for unusual query patterns or failed injection attempts. Additionally, conduct internal penetration testing focused on the CRM to identify any residual injection points. Organizations should also review and enforce the principle of least privilege for CRM user accounts to minimize the impact of potential exploitation. Finally, ensure that data backups are current and tested for recovery to mitigate potential data loss.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T05:44:18.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a48084ad5a09ad00f82386

Added to database: 8/19/2025, 1:47:48 PM

Last enriched: 8/19/2025, 2:03:40 PM

Last updated: 8/20/2025, 12:35:26 AM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats