EUVD-2025-18423

| CVE-2025-6132 HIGH
2025-06-16 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 21:59 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 21:59 euvd
EUVD-2025-18423
PoC Detected
Dec 03, 2025 - 21:13 vuln.today
Public exploit code
CVE Published
Jun 16, 2025 - 18:15 nvd
HIGH 7.3

Description

A vulnerability has been found in Chanjet CRM 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysconfig/departmentsetting.php. The manipulation of the argument gblOrgID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.

Analysis

Critical SQL injection vulnerability in Chanjet CRM 1.0 affecting the /sysconfig/departmentsetting.php endpoint via the gblOrgID parameter. An unauthenticated remote attacker can manipulate this parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has public exploit disclosure and demonstrates active exploitation potential, making it a high-priority remediation target despite the moderate CVSS score.

Technical Context

This vulnerability exploits improper input validation in a PHP-based web application (Chanjet CRM). The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as CWE-89 SQL Injection when specifically targeting SQL contexts). The vulnerable endpoint /sysconfig/departmentsetting.php fails to properly sanitize or parameterize the gblOrgID user input before incorporating it into SQL query construction. This allows attackers to inject malicious SQL syntax that modifies query logic. The attack vector is network-based with no authentication or user interaction required (CVSS AV:N/AC:L/PR:N/UI:N), indicating the vulnerability is accessible from any network position without credentials. The affected product is Chanjet CRM version 1.0, a customer relationship management platform likely used in enterprise environments.

Affected Products

Chanjet CRM version 1.0 is the explicitly confirmed affected product. No specific CPE string data was provided in the intelligence, but the affected component is: Product: Chanjet CRM, Affected Version: 1.0, Vulnerable File: /sysconfig/departmentsetting.php, Vulnerable Parameter: gblOrgID. No patched versions, vendor advisories, or alternative product versions are documented in the provided intelligence. It is unknown whether earlier versions (pre-1.0) or later versions (post-1.0) are affected; vendor clarification is required.

Remediation

Immediate actions: (1) Apply vendor security patch if available from Chanjet (contact vendor directly for CVE-2025-6132 patch status, as no specific patch URL is provided in available intelligence); (2) If patching is unavailable, implement input validation and parameterized queries in /sysconfig/departmentsetting.php to sanitize the gblOrgID parameter using prepared statements or parameterized query APIs; (3) Restrict access to /sysconfig/departmentsetting.php via network access controls (firewall, WAF) to trusted administrative IP ranges; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the gblOrgID parameter (e.g., regex detecting SQL keywords, quote characters, or comment syntax); (5) Apply database-level principle of least privilege—ensure the CRM database account used by the application has minimal required permissions, not full administrative rights; (6) Enable database query logging and monitor for anomalous SQL execution patterns; (7) Conduct urgent security audit of other PHP endpoints in Chanjet CRM for similar injection vulnerabilities.

Priority Score

57
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: +20

Share

EUVD-2025-18423 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy