CVE-2025-60375
📋 TL;DR
This authentication bypass vulnerability in Perfex CRM allows attackers to gain unauthorized access by submitting empty username and password parameters. Attackers can access any user account including administrative accounts without valid credentials. All Perfex CRM installations before version 3.3.1 are affected.
💻 Affected Systems
- Perfex CRM
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the CRM system with administrative access, leading to data theft, system takeover, and potential lateral movement to connected systems.
Likely Case
Unauthorized access to user accounts, data exfiltration, privilege escalation, and potential business disruption.
If Mitigated
Limited impact with proper network segmentation, but still exposes sensitive CRM data to unauthorized access.
🎯 Exploit Status
Simple HTTP request manipulation with empty parameters. Public proof-of-concept available on GitHub.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 3.3.1
Vendor Advisory: https://github.com/AhamedYaseen03/CVE-2025-60375
Restart Required: No
Instructions:
1. Backup your Perfex CRM installation and database. 2. Download Perfex CRM version 3.3.1 or later from official sources. 3. Replace existing files with new version files. 4. Clear browser cache and test authentication.
🔧 Temporary Workarounds
Input Validation Web Application Firewall Rule
allBlock login requests with empty username or password parameters at the WAF level
WAF specific - configure rule to block POST requests to login endpoint with empty username or password parameters
Temporary Authentication Hardening
allAdd server-side validation to check for empty credentials before processing
Modify application code to validate username and password are not empty before authentication logic
🧯 If You Can't Patch
- Implement network-level restrictions to limit access to the CRM login page to trusted IP addresses only
- Enable multi-factor authentication if supported, though this may not fully mitigate the bypass
🔍 How to Verify
Check if Vulnerable:
Send POST request to login endpoint with empty username and password parameters. If login succeeds, system is vulnerable.
Check Version:
Check Perfex CRM version in admin panel or system settings
Verify Fix Applied:
Attempt the same empty credential login after patching. Should receive authentication failure.
📡 Detection & Monitoring
Log Indicators:
- Successful login attempts with empty username or password fields
- Multiple failed login attempts followed by success with empty credentials
Network Indicators:
- HTTP POST requests to login endpoint with empty parameters
- Unusual authentication patterns from single IP
SIEM Query:
source="web_server" AND (username="" OR password="") AND action="login_success"