CVE-2025-60375

7.3 HIGH

📋 TL;DR

This authentication bypass vulnerability in Perfex CRM allows attackers to gain unauthorized access by submitting empty username and password parameters. Attackers can access any user account including administrative accounts without valid credentials. All Perfex CRM installations before version 3.3.1 are affected.

💻 Affected Systems

Products:
  • Perfex CRM
Versions: All versions before 3.3.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: All default installations are vulnerable. No special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the CRM system with administrative access, leading to data theft, system takeover, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to user accounts, data exfiltration, privilege escalation, and potential business disruption.

🟢

If Mitigated

Limited impact with proper network segmentation, but still exposes sensitive CRM data to unauthorized access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP request manipulation with empty parameters. Public proof-of-concept available on GitHub.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.3.1

Vendor Advisory: https://github.com/AhamedYaseen03/CVE-2025-60375

Restart Required: No

Instructions:

1. Backup your Perfex CRM installation and database. 2. Download Perfex CRM version 3.3.1 or later from official sources. 3. Replace existing files with new version files. 4. Clear browser cache and test authentication.

🔧 Temporary Workarounds

Input Validation Web Application Firewall Rule

all

Block login requests with empty username or password parameters at the WAF level

WAF specific - configure rule to block POST requests to login endpoint with empty username or password parameters

Temporary Authentication Hardening

all

Add server-side validation to check for empty credentials before processing

Modify application code to validate username and password are not empty before authentication logic

🧯 If You Can't Patch

  • Implement network-level restrictions to limit access to the CRM login page to trusted IP addresses only
  • Enable multi-factor authentication if supported, though this may not fully mitigate the bypass

🔍 How to Verify

Check if Vulnerable:

Send POST request to login endpoint with empty username and password parameters. If login succeeds, system is vulnerable.

Check Version:

Check Perfex CRM version in admin panel or system settings

Verify Fix Applied:

Attempt the same empty credential login after patching. Should receive authentication failure.

📡 Detection & Monitoring

Log Indicators:

  • Successful login attempts with empty username or password fields
  • Multiple failed login attempts followed by success with empty credentials

Network Indicators:

  • HTTP POST requests to login endpoint with empty parameters
  • Unusual authentication patterns from single IP

SIEM Query:

source="web_server" AND (username="" OR password="") AND action="login_success"

🔗 References

📤 Share & Export