CVE-2025-10390

5.4 MEDIUM

📋 TL;DR

CRMEB versions up to 5.6.1 contain an improper authorization vulnerability in the editAddress function that allows attackers to manipulate address IDs. This enables unauthorized modification of user address data, potentially affecting all users of vulnerable CRMEB installations. The vulnerability is remotely exploitable and public exploit details exist.

💻 Affected Systems

Products:
  • CRMEB
Versions: up to 5.6.1
Operating Systems: Any
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all installations using vulnerable versions; requires user authentication to exploit but bypasses authorization checks.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify any user's address information, potentially enabling account takeover, data manipulation, or facilitating social engineering attacks.

🟠

Likely Case

Unauthorized modification of user address data, potentially leading to order redirection, data integrity issues, or privacy violations.

🟢

If Mitigated

Limited impact with proper access controls and monitoring, potentially only affecting non-sensitive address fields.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details are publicly available; requires authenticated user access but bypasses authorization controls.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to version 5.6.2 or later if available; otherwise apply manual code fix to UserAddressServices.php to add proper authorization checks.

🔧 Temporary Workarounds

Manual Code Fix

all

Add proper authorization checks to the editAddress function in UserAddressServices.php to verify users can only modify their own addresses.

WAF Rule Implementation

all

Implement web application firewall rules to detect and block suspicious address ID manipulation attempts.

🧯 If You Can't Patch

  • Implement strict input validation and authorization middleware for all user address operations
  • Enable detailed logging of address modification attempts and monitor for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check CRMEB version in system configuration; if version is 5.6.1 or earlier, review UserAddressServices.php for missing authorization checks in editAddress function.

Check Version:

Check CRMEB version in admin panel or system configuration files

Verify Fix Applied:

Test that authenticated users cannot modify other users' address data; verify authorization checks are implemented in the editAddress function.

📡 Detection & Monitoring

Log Indicators:

  • Multiple address modification attempts from single user
  • Address ID values outside expected range
  • Rapid sequential address updates

Network Indicators:

  • Unusual patterns in POST requests to address modification endpoints
  • Address ID parameter manipulation in requests

SIEM Query:

source="web_logs" AND (uri_path="/user/address/edit" OR uri_path LIKE "%/address/update%") AND (status=200 OR status=302) | stats count by src_ip, user_id

🔗 References

📤 Share & Export