CVE-2025-6106

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in WukongCRM 9.0 allows attackers to trick authenticated administrators into performing unintended actions by visiting malicious web pages. The vulnerability affects all users running WukongCRM 9.0 with administrative access. Attackers can exploit this remotely without direct access to the target system.

💻 Affected Systems

Products:
  • WukongCRM
Versions: 9.0
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with administrative access enabled. Requires authenticated admin sessions for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could create new admin accounts, modify user permissions, or delete critical data by tricking administrators into clicking malicious links.

🟠

Likely Case

Attackers create backdoor admin accounts or modify existing user permissions to gain persistent access to the CRM system.

🟢

If Mitigated

With proper CSRF protections and user awareness, exploitation attempts fail or have minimal impact.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires social engineering to trick authenticated admins. Public disclosure increases weaponization likelihood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

No official patch available. Vendor has not responded to disclosure. Consider workarounds or alternative solutions.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add CSRF protection tokens to all administrative forms and endpoints

Modify AdminRoleController.java to include CSRF token validation

SameSite Cookie Attribute

all

Set SameSite=Strict attribute on session cookies

Configure application server to set SameSite=Strict for session cookies

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to detect and block CSRF attempts
  • Educate administrators about phishing risks and require manual confirmation for sensitive actions

🔍 How to Verify

Check if Vulnerable:

Check if AdminRoleController.java lacks CSRF token validation in WukongCRM 9.0 installation

Check Version:

Check WukongCRM version in application interface or configuration files

Verify Fix Applied:

Test administrative endpoints with and without CSRF tokens to ensure proper validation

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed admin actions from same IP
  • Admin actions without referrer headers
  • Unusual admin account creation patterns

Network Indicators:

  • HTTP requests to admin endpoints without CSRF tokens
  • Requests with mismatched referrer/origin headers

SIEM Query:

source="web_logs" AND (uri="/admin/*" OR uri="/AdminRoleController") AND (csrf_token="" OR referrer="" OR origin="")

🔗 References

📤 Share & Export