CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Lifecycle Timeline
2DescriptionNVD
Vtiger CRM 8.4.0 contains a reflected cross-site scripting (XSS) vulnerability in the MailManager module. Improper handling of user-controlled input in the _folder parameter allows a specially crafted, double URL-encoded payload to be reflected and executed in the context of an authenticated user s session.
AnalysisAI
Reflected cross-site scripting (XSS) in Vtiger CRM 8.4.0 MailManager module allows authenticated attackers to execute arbitrary JavaScript in a user's browser session via a specially crafted double URL-encoded payload in the _folder parameter. The vulnerability requires user interaction (UI:R) and affects confidentiality and integrity within the scope of the authenticated session. With an EPSS score of 0.02% (5th percentile), real-world exploitation risk is minimal despite public disclosure.
Technical ContextAI
The vulnerability exists in Vtiger CRM's MailManager module, a component for managing email functionality within the CRM platform. The root cause is improper input validation and output encoding of the _folder parameter, classified under CWE-79 (Improper Neutralization of Input During Web Page Generation). The attacker leverages double URL-encoding to bypass initial input sanitization, allowing the payload to reach the JavaScript rendering engine unfiltered. This occurs in a reflected XSS context, meaning the malicious input is not persisted but echoed back to the victim's browser, requiring the attacker to deliver the crafted URL to the target user.
RemediationAI
Upgrade Vtiger CRM to a patched version that addresses the XSS vulnerability in the MailManager module. Exact patched version numbers are not specified in the provided advisory data; consult the official Vtiger security advisory or changelog for the specific release containing the fix. As an interim measure, restrict access to the MailManager module to trusted users only, implement Content Security Policy (CSP) headers to mitigate reflected XSS impact, and conduct input validation and output encoding reviews of the _folder parameter in the MailManager code. Additionally, educate users to avoid clicking links from untrusted sources, as this vulnerability requires user interaction to trigger. For more details, refer to the NVD entry at https://nvd.nist.gov/vuln/detail/CVE-2025-70936 and the Vtiger project repository.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-209429
GHSA-3q54-fg6h-32ch