CVE-2025-10346

6.1 MEDIUM

📋 TL;DR

This CVE describes a stored HTML injection vulnerability in Perfex CRM v3.2.1 that allows attackers to inject malicious HTML content into knowledge base articles. The vulnerability affects all users of Perfex CRM v3.2.1 who have access to create or modify knowledge base articles. Successful exploitation could lead to cross-site scripting attacks against other users viewing the compromised articles.

💻 Affected Systems

Products:
  • Perfex CRM
Versions: v3.2.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default installation and requires no special configuration to be exploitable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious scripts that steal session cookies, redirect users to phishing sites, or perform actions on behalf of authenticated users, potentially leading to account compromise and data theft.

🟠

Likely Case

Attackers inject HTML that displays misleading information, defaces the knowledge base, or redirects users to malicious sites, compromising the integrity of the CRM system.

🟢

If Mitigated

With proper input validation and output encoding, injected HTML would be rendered as plain text rather than executable code, preventing any malicious impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access to create or modify knowledge base articles. The vulnerability is in the 'subject' parameter of the knowledge_base/article endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after v3.2.1

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-perfex-crm

Restart Required: No

Instructions:

1. Update Perfex CRM to the latest version. 2. Verify the patch by checking that HTML injection in the 'subject' parameter is no longer possible. 3. Review existing knowledge base articles for malicious content.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize HTML tags in the 'subject' parameter before processing.

Implement input sanitization in the knowledge_base/article endpoint controller

🧯 If You Can't Patch

  • Implement a web application firewall (WAF) with HTML injection rules
  • Disable knowledge base article creation/modification for non-admin users

🔍 How to Verify

Check if Vulnerable:

Attempt to inject HTML tags like <script>alert('test')</script> into the 'subject' parameter when creating a knowledge base article. If the script executes when viewing the article, the system is vulnerable.

Check Version:

Check the Perfex CRM version in the admin panel or via the application's version file.

Verify Fix Applied:

After patching, repeat the HTML injection test. The HTML should be displayed as plain text rather than executed.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to knowledge_base/article with HTML tags in parameters
  • Multiple failed injection attempts

Network Indicators:

  • HTTP POST requests containing script tags or other HTML injection payloads

SIEM Query:

source="web_logs" AND uri="/knowledge_base/article" AND method="POST" AND (param="subject" AND value CONTAINS "<script>" OR value CONTAINS "javascript:")

🔗 References

📤 Share & Export