CVE-2025-2365

6.3 MEDIUM

📋 TL;DR

This vulnerability allows remote attackers to perform XML External Entity (XXE) attacks through the webHook function in crmeb_java's WeChatMessageController. Attackers can potentially read sensitive files, cause denial of service, or perform server-side request forgery. All users running crmeb_java versions up to 1.3.4 are affected.

💻 Affected Systems

Products:
  • crmeb_java
Versions: up to 1.3.4
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default configuration when webHook functionality is enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through file disclosure, SSRF attacks, or denial of service via entity expansion attacks.

🟠

Likely Case

Sensitive file disclosure from the server, including configuration files, credentials, or internal data.

🟢

If Mitigated

Limited impact if XML parsing is disabled or properly configured to reject external entities.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit available on GitHub, requires sending specially crafted XML to vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: unknown

Vendor Advisory: none

Restart Required: No

Instructions:

No official patch available. Upgrade to version above 1.3.4 if available, or implement workarounds.

🔧 Temporary Workarounds

Disable XXE in XML parser

all

Configure XML parser to disable external entity processing

Modify WeChatMessageController.java to set XML parser properties: FEATURE_SECURE_PROCESSING = true, DISALLOW_DOCTYPE_DECL = true

Input validation and filtering

all

Implement strict input validation to reject XML containing external entity references

Add input validation in webHook method to detect and reject XXE patterns

🧯 If You Can't Patch

  • Implement network segmentation to restrict access to vulnerable endpoints
  • Deploy web application firewall with XXE protection rules

🔍 How to Verify

Check if Vulnerable:

Check if running crmeb_java version ≤1.3.4 and webHook endpoint accepts XML input

Check Version:

Check application version in configuration files or via application interface

Verify Fix Applied:

Test with XXE payloads to confirm they are rejected or fail to execute

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML payloads in webHook requests
  • File read attempts in logs
  • External entity references in request data

Network Indicators:

  • HTTP requests to webHook endpoint with XML containing DOCTYPE declarations
  • Outbound connections initiated by server to external URLs

SIEM Query:

source="webhook" AND (payload CONTAINS "<!DOCTYPE" OR payload CONTAINS "SYSTEM")

🔗 References

📤 Share & Export