Skip to main content

CVE-2025-9140: SQL Injection in Shanghai Lingdang Information Technology Lingdang CRM

Medium
VulnerabilityCVE-2025-9140cvecve-2025-9140
Published: Tue Aug 19 2025 (08/19/2025, 13:32:06 UTC)
Source: CVE Database V5
Vendor/Project: Shanghai Lingdang Information Technology
Product: Lingdang CRM

Description

A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: "All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+."

AI-Powered Analysis

AILast updated: 08/29/2025, 00:42:57 UTC

Technical Analysis

CVE-2025-9140 is a medium severity SQL Injection vulnerability affecting Shanghai Lingdang Information Technology's Lingdang CRM product, specifically versions up to 8.6.4.7. The vulnerability resides in the /crm/crmapi/erp/tabdetail_moduleSave.php file, where the 'getvaluestring' parameter is improperly sanitized, allowing an attacker to inject malicious SQL code. This flaw can be exploited remotely without requiring user interaction or elevated privileges, making it accessible to unauthenticated attackers with network access to the CRM system. The vulnerability arises from the failure to use parameterized queries and insufficient input validation, which enables attackers to manipulate backend database queries. Exploitation could lead to unauthorized data access, data modification, or even deletion, compromising the confidentiality, integrity, and availability of the CRM database. The vendor has addressed this issue in version 8.6.5.4 by implementing parameterized queries and input sanitization to eliminate SQL injection vectors. Although no known exploits are currently active in the wild, public exploit code is available, increasing the risk of exploitation. The CVSS 4.0 base score is 5.3, reflecting a medium severity level due to the ease of exploitation balanced against the limited scope and partial impact on confidentiality, integrity, and availability.

Potential Impact

For European organizations using Lingdang CRM versions up to 8.6.4.7, this vulnerability poses a significant risk to sensitive customer and business data stored within the CRM system. Successful exploitation could lead to unauthorized data disclosure, alteration of customer records, or disruption of CRM services, impacting business operations and customer trust. Given that CRM systems often integrate with other enterprise applications, a compromise could facilitate lateral movement within the network, potentially exposing additional systems. The remote and unauthenticated nature of the attack vector increases the threat level, especially for organizations with externally accessible CRM portals. Compliance with GDPR and other data protection regulations in Europe means that data breaches resulting from this vulnerability could lead to regulatory penalties and reputational damage. Organizations in sectors such as finance, healthcare, and retail, which rely heavily on CRM data, are particularly at risk.

Mitigation Recommendations

European organizations should immediately assess their Lingdang CRM deployments to identify affected versions. The primary mitigation is to upgrade all affected Lingdang CRM instances to version 8.6.5.4 or later, where the vulnerability has been patched through parameterized queries and input sanitization. Until upgrades can be applied, organizations should implement web application firewalls (WAFs) with rules specifically designed to detect and block SQL injection attempts targeting the 'getvaluestring' parameter. Network segmentation should be enforced to restrict external access to the CRM system, limiting exposure to trusted internal networks or VPN users only. Regular security audits and code reviews should be conducted to identify any other injection points. Additionally, monitoring and logging of database queries and web application logs should be enhanced to detect anomalous activities indicative of exploitation attempts. Backup procedures must be verified to ensure rapid recovery in case of data compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T05:44:18.399Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a48084ad5a09ad00f82386

Added to database: 8/19/2025, 1:47:48 PM

Last enriched: 8/29/2025, 12:42:57 AM

Last updated: 10/2/2025, 6:47:06 PM

Views: 52

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats