A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
CRMEB GET Parameter product sql injection
Problem type
Affected products
5.0 - AFFECTED
5.1 - AFFECTED
5.2 - AFFECTED
5.3 - AFFECTED
5.4 - AFFECTED
5.5 - AFFECTED
5.6 - AFFECTED
References
https://vuldb.com/?id.327046
https://vuldb.com/?ctiid.327046
https://vuldb.com/?submit.659736
https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md
GitHub Security Advisories
GHSA-5537-m9qw-hvg3
A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown...
https://github.com/advisories/GHSA-5537-m9qw-hvg3A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.
https://nvd.nist.gov/vuln/detail/CVE-2025-11288
https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md
https://vuldb.com/?ctiid.327046
https://vuldb.com/?id.327046
https://vuldb.com/?submit.659736
https://github.com/advisories/GHSA-5537-m9qw-hvg3
JSON source
Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"cveMetadata": {
"cveId": "CVE-2025-11288",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2025-10-06T14:16:13.192Z",
"dateReserved": "2025-10-04T11:30:31.494Z",
"datePublished": "2025-10-05T07:32:06.514Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2025-10-05T07:32:06.514Z"
},
"title": "CRMEB GET Parameter product sql injection",
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
},
{
"lang": "de",
"value": "In CRMEB up to 5.6 wurde eine Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Datei /adminapi/product/product der Komponente GET Parameter Handler. Mittels Manipulieren des Arguments cate_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff lässt sich über das Netzwerk starten. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."
}
],
"affected": [
{
"vendor": "n/a",
"product": "CRMEB",
"modules": [
"GET Parameter Handler"
],
"versions": [
{
"version": "5.0",
"status": "affected"
},
{
"version": "5.1",
"status": "affected"
},
{
"version": "5.2",
"status": "affected"
},
{
"version": "5.3",
"status": "affected"
},
{
"version": "5.4",
"status": "affected"
},
{
"version": "5.5",
"status": "affected"
},
{
"version": "5.6",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "SQL Injection",
"cweId": "CWE-89",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/?id.327046",
"name": "VDB-327046 | CRMEB GET Parameter product sql injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/?ctiid.327046",
"name": "VDB-327046 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/?submit.659736",
"name": "Submit #659736 | CRMEB CRMEB 电商系统 v5.6 Vulnerability type: SQL Injection",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 6.3,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 6.5
}
}
],
"timeline": [
{
"time": "2025-10-04T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2025-10-04T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2025-10-04T13:35:34.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "BlackSpdier (VulDB User)",
"type": "reporter"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2025-10-06T14:16:13.192Z"
},
"title": "CISA ADP Vulnrichment",
"references": [
{
"url": "https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md",
"tags": [
"exploit"
]
}
],
"metrics": [
{}
]
}
]
}
}