2025-10-05 7:32CVE-2025-11288VulDB
PUBLISHED5.1CWE-89CWE-74

CRMEB GET Parameter product sql injection

A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

Problem type

Affected products

CRMEB

5.0 - AFFECTED

5.1 - AFFECTED

5.2 - AFFECTED

5.3 - AFFECTED

5.4 - AFFECTED

5.5 - AFFECTED

5.6 - AFFECTED

References

GitHub Security Advisories

GHSA-5537-m9qw-hvg3

A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown...

https://github.com/advisories/GHSA-5537-m9qw-hvg3

A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way.

JSON source

Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "cveMetadata": {
    "cveId": "CVE-2025-11288",
    "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
    "assignerShortName": "VulDB",
    "dateUpdated": "2025-10-06T14:16:13.192Z",
    "dateReserved": "2025-10-04T11:30:31.494Z",
    "datePublished": "2025-10-05T07:32:06.514Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
        "shortName": "VulDB",
        "dateUpdated": "2025-10-05T07:32:06.514Z"
      },
      "title": "CRMEB GET Parameter product sql injection",
      "descriptions": [
        {
          "lang": "en",
          "value": "A security flaw has been discovered in CRMEB up to 5.6. This issue affects some unknown processing of the file /adminapi/product/product of the component GET Parameter Handler. Performing manipulation of the argument cate_id results in sql injection. Remote exploitation of the attack is possible. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
        },
        {
          "lang": "de",
          "value": "In CRMEB up to 5.6 wurde eine Schwachstelle gefunden. Hierbei betrifft es unbekannten Programmcode der Datei /adminapi/product/product der Komponente GET Parameter Handler. Mittels Manipulieren des Arguments cate_id mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Der Angriff lässt sich über das Netzwerk starten. Der Exploit wurde der Öffentlichkeit bekannt gemacht und könnte verwendet werden."
        }
      ],
      "affected": [
        {
          "vendor": "n/a",
          "product": "CRMEB",
          "modules": [
            "GET Parameter Handler"
          ],
          "versions": [
            {
              "version": "5.0",
              "status": "affected"
            },
            {
              "version": "5.1",
              "status": "affected"
            },
            {
              "version": "5.2",
              "status": "affected"
            },
            {
              "version": "5.3",
              "status": "affected"
            },
            {
              "version": "5.4",
              "status": "affected"
            },
            {
              "version": "5.5",
              "status": "affected"
            },
            {
              "version": "5.6",
              "status": "affected"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "SQL Injection",
              "cweId": "CWE-89",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "Injection",
              "cweId": "CWE-74",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://vuldb.com/?id.327046",
          "name": "VDB-327046 | CRMEB GET Parameter product sql injection",
          "tags": [
            "vdb-entry",
            "technical-description"
          ]
        },
        {
          "url": "https://vuldb.com/?ctiid.327046",
          "name": "VDB-327046 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "tags": [
            "signature",
            "permissions-required"
          ]
        },
        {
          "url": "https://vuldb.com/?submit.659736",
          "name": "Submit #659736 | CRMEB CRMEB 电商系统 v5.6 Vulnerability type: SQL Injection",
          "tags": [
            "third-party-advisory"
          ]
        },
        {
          "url": "https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md",
          "tags": [
            "exploit"
          ]
        }
      ],
      "metrics": [
        {},
        {
          "cvssV3_1": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM"
          }
        },
        {
          "cvssV3_0": {
            "version": "3.0",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM"
          }
        },
        {
          "cvssV2_0": {
            "version": "2.0",
            "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
            "baseScore": 6.5
          }
        }
      ],
      "timeline": [
        {
          "time": "2025-10-04T00:00:00.000Z",
          "lang": "en",
          "value": "Advisory disclosed"
        },
        {
          "time": "2025-10-04T02:00:00.000Z",
          "lang": "en",
          "value": "VulDB entry created"
        },
        {
          "time": "2025-10-04T13:35:34.000Z",
          "lang": "en",
          "value": "VulDB entry last update"
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "BlackSpdier (VulDB User)",
          "type": "reporter"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-10-06T14:16:13.192Z"
        },
        "title": "CISA ADP Vulnrichment",
        "references": [
          {
            "url": "https://github.com/coolcj-stack/CRMEB-V5.6-SQL-Injection/blob/main/README.md",
            "tags": [
              "exploit"
            ]
          }
        ],
        "metrics": [
          {}
        ]
      }
    ]
  }
}

Mitre source

https://cveawg.mitre.org/api/cve/CVE-2025-11288