CVE-2025-60378

8.1 HIGH

📋 TL;DR

Authenticated users in RISE Ultimate Project Manager & CRM can inject malicious HTML into invoices and messages. This content renders in emails, PDFs, and chat modules sent to clients or team members, enabling phishing attacks and credential theft. The vulnerability affects all organizations using vulnerable versions of this software.

💻 Affected Systems

Products:
  • RISE Ultimate Project Manager & CRM
Versions: All versions prior to patch
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to invoice/messaging functionality. Automated recurring invoices amplify impact by distributing malicious content to multiple recipients.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could send convincing phishing emails from legitimate business accounts, leading to widespread credential theft, financial fraud, and business email compromise affecting multiple clients.

🟠

Likely Case

Authenticated malicious insiders or compromised accounts inject phishing links into invoices/messages, tricking recipients into revealing credentials or making fraudulent payments.

🟢

If Mitigated

With proper input validation and output encoding, HTML injection would be neutralized, preventing malicious content from executing in recipient contexts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple - just injecting HTML into vulnerable fields. GitHub repository contains proof-of-concept.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://rise.com

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available patches. 3. Verify input validation and output encoding are properly implemented.

🔧 Temporary Workarounds

Implement Input Validation

all

Add server-side validation to sanitize HTML content in invoice and message fields

Enable Content Security Policy

all

Implement CSP headers to restrict execution of injected scripts

🧯 If You Can't Patch

  • Restrict user permissions to prevent unauthorized users from creating/modifying invoices and messages
  • Monitor outgoing emails and PDFs for suspicious HTML content or phishing indicators

🔍 How to Verify

Check if Vulnerable:

Test by injecting simple HTML like <b>test</b> into invoice description or message fields and check if it renders in output

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Attempt HTML injection after patch - injected content should be displayed as plain text, not rendered

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTML patterns in invoice/message creation logs
  • Multiple invoice/message edits by single user in short time

Network Indicators:

  • Outgoing emails with suspicious HTML content
  • PDF generation with embedded scripts

SIEM Query:

search 'invoice creation' OR 'message sent' AND contains('<script>' OR 'javascript:' OR 'onclick=')

🔗 References

📤 Share & Export