CVE-2025-56807

6.1 MEDIUM

📋 TL;DR

This cross-site scripting (XSS) vulnerability in FairSketch RISE Ultimate Project Manager & CRM allows administrators to inject malicious JavaScript when creating folders via the admin dashboard file explorer. The stored XSS payload can execute in other users' browsers, potentially compromising their sessions. Only administrators can exploit this vulnerability, but it affects all users who access the compromised interface.

💻 Affected Systems

Products:
  • FairSketch RISE Ultimate Project Manager & CRM
Versions: 3.9.4
Operating Systems: All platforms running the software
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator privileges to exploit. The vulnerability is in the file explorer component of the admin dashboard.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full system takeover, data theft, or ransomware deployment through privilege escalation.

🟠

Likely Case

Session hijacking of other administrators or users, credential theft, or defacement of the application interface.

🟢

If Mitigated

Limited impact with proper input validation and output encoding, potentially only affecting the specific administrator's session.

🌐 Internet-Facing: MEDIUM - If the admin dashboard is exposed to the internet, attackers could exploit this after compromising an admin account through other means.
🏢 Internal Only: MEDIUM - Internal administrators could abuse this for privilege escalation or lateral movement within the organization.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept available on GitHub. Requires administrator credentials to access the vulnerable file explorer interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.9.5 or later

Vendor Advisory: http://fairsketch.com

Restart Required: No

Instructions:

1. Backup your current installation. 2. Download the latest version from the official vendor website. 3. Replace the vulnerable files with patched versions. 4. Clear browser caches and test functionality.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement server-side input validation to sanitize folder names and prevent JavaScript injection.

Output Encoding

all

Apply proper output encoding when displaying folder names in the user interface.

🧯 If You Can't Patch

  • Restrict admin dashboard access to trusted IP addresses only using firewall rules.
  • Implement web application firewall (WAF) rules to block XSS payloads in folder creation requests.

🔍 How to Verify

Check if Vulnerable:

Attempt to create a folder with a JavaScript payload like <script>alert('XSS')</script> in the admin dashboard file explorer. If the script executes when viewing the folder, the system is vulnerable.

Check Version:

Check the software version in the admin dashboard or configuration files. For web interface: typically visible in footer or about page.

Verify Fix Applied:

After patching, repeat the test with the same payload. The script should not execute, and special characters should be properly encoded or rejected.

📡 Detection & Monitoring

Log Indicators:

  • Unusual folder creation events with special characters or script tags in admin logs
  • Multiple failed login attempts followed by successful admin login and folder creation

Network Indicators:

  • HTTP POST requests to folder creation endpoints containing script tags or JavaScript code
  • Unusual outbound connections from the application server after folder creation

SIEM Query:

source="web_server_logs" AND (uri="/admin/file-explorer/create-folder" OR uri="/admin/folder/create") AND (body CONTAINS "<script>" OR body CONTAINS "javascript:")

🔗 References

📤 Share & Export