CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Lifecycle Timeline
4Tags
Description
A vulnerability has been found in Chanjet CRM 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /sysconfig/departmentsetting.php. The manipulation of the argument gblOrgID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used.
Analysis
Critical SQL injection vulnerability in Chanjet CRM 1.0 affecting the /sysconfig/departmentsetting.php endpoint via the gblOrgID parameter. An unauthenticated remote attacker can manipulate this parameter to execute arbitrary SQL queries, potentially leading to unauthorized data access, modification, or deletion. The vulnerability has public exploit disclosure and demonstrates active exploitation potential, making it a high-priority remediation target despite the moderate CVSS score.
Technical Context
This vulnerability exploits improper input validation in a PHP-based web application (Chanjet CRM). The root cause is CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component, also known as CWE-89 SQL Injection when specifically targeting SQL contexts). The vulnerable endpoint /sysconfig/departmentsetting.php fails to properly sanitize or parameterize the gblOrgID user input before incorporating it into SQL query construction. This allows attackers to inject malicious SQL syntax that modifies query logic. The attack vector is network-based with no authentication or user interaction required (CVSS AV:N/AC:L/PR:N/UI:N), indicating the vulnerability is accessible from any network position without credentials. The affected product is Chanjet CRM version 1.0, a customer relationship management platform likely used in enterprise environments.
Affected Products
Chanjet CRM version 1.0 is the explicitly confirmed affected product. No specific CPE string data was provided in the intelligence, but the affected component is: Product: Chanjet CRM, Affected Version: 1.0, Vulnerable File: /sysconfig/departmentsetting.php, Vulnerable Parameter: gblOrgID. No patched versions, vendor advisories, or alternative product versions are documented in the provided intelligence. It is unknown whether earlier versions (pre-1.0) or later versions (post-1.0) are affected; vendor clarification is required.
Remediation
Immediate actions: (1) Apply vendor security patch if available from Chanjet (contact vendor directly for CVE-2025-6132 patch status, as no specific patch URL is provided in available intelligence); (2) If patching is unavailable, implement input validation and parameterized queries in /sysconfig/departmentsetting.php to sanitize the gblOrgID parameter using prepared statements or parameterized query APIs; (3) Restrict access to /sysconfig/departmentsetting.php via network access controls (firewall, WAF) to trusted administrative IP ranges; (4) Implement Web Application Firewall (WAF) rules to detect and block SQL injection patterns in the gblOrgID parameter (e.g., regex detecting SQL keywords, quote characters, or comment syntax); (5) Apply database-level principle of least privilege—ensure the CRM database account used by the application has minimal required permissions, not full administrative rights; (6) Enable database query logging and monitor for anomalous SQL execution patterns; (7) Conduct urgent security audit of other PHP endpoints in Chanjet CRM for similar injection vulnerabilities.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-18423