CVE-2025-8852

4.3 MEDIUM

📋 TL;DR

This vulnerability in WuKongCRM 11.0 allows remote attackers to obtain sensitive information through error messages exposed by the API Response Handler at /adminFile/upload. Organizations using WuKongCRM 11.0 are affected, particularly those with internet-facing instances.

💻 Affected Systems

Products:
  • WuKongOpenSource WukongCRM
Versions: 11.0
Operating Systems: Any OS running WukongCRM
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the API Response Handler component at /adminFile/upload endpoint

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could extract sensitive system information, configuration details, or database credentials from verbose error messages, potentially enabling further attacks.

🟠

Likely Case

Information disclosure revealing system paths, software versions, or partial data structures that could aid reconnaissance for more serious attacks.

🟢

If Mitigated

Limited exposure of non-critical system information with proper error handling and logging controls in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit details have been publicly disclosed in GitHub issues

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check GitHub repository for latest patched version

Vendor Advisory: https://github.com/WuKongOpenSource/WukongCRM-11.0-JAVA/issues/26

Restart Required: No

Instructions:

1. Monitor GitHub repository for official patch 2. Apply patch when available 3. Test in non-production environment first

🔧 Temporary Workarounds

Implement custom error handling

all

Override default error responses to prevent information leakage

Implement custom error handler in API Response Handler

Restrict access to /adminFile/upload

all

Apply access controls to limit who can reach the vulnerable endpoint

Configure web server or application firewall rules

🧯 If You Can't Patch

  • Implement web application firewall with rules to sanitize error responses
  • Monitor logs for unusual access patterns to /adminFile/upload endpoint

🔍 How to Verify

Check if Vulnerable:

Test /adminFile/upload endpoint with malformed requests and check if verbose error messages are returned

Check Version:

Check application version in admin panel or configuration files

Verify Fix Applied:

Verify that error responses no longer contain sensitive system information

📡 Detection & Monitoring

Log Indicators:

  • Multiple error responses from /adminFile/upload
  • Unusual request patterns to admin endpoints

Network Indicators:

  • HTTP requests to /adminFile/upload with malformed parameters

SIEM Query:

source="web_server" AND uri="/adminFile/upload" AND status=500

🔗 References

📤 Share & Export