Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Posted on August 25, 2025August 25, 2025 By CWS

A complete safety evaluation of vtenext CRM model 25.02 has revealed a number of important vulnerabilities that enable unauthenticated attackers to bypass authentication mechanisms by three distinct assault vectors, in the end resulting in distant code execution on course programs. 

The Italian CRM answer, utilized by quite a few small and medium enterprises throughout Italy, faces important safety publicity regardless of tried vendor notifications.

Key Takeaways1. Three authentication bypasses let attackers impersonate any person.2. Put up‐login, LFI and module‐add flaws allow distant code execution.3. Solely the password‐reset subject was silently patched; others nonetheless want fixes.

XSS and Session Hijacking

Sicuranext studies that the primary assault vector exploits a vulnerability chain combining mirrored Cross-Web site Scripting (XSS), CSRF token bypass, and session cookie disclosure. 

A important flaw in modules/Dwelling/HomeWidgetBlockList.php the place the widgetId parameter undergoes inadequate sanitization earlier than reflection in server responses.

The vulnerability manifests when JSON responses containing malicious payloads are delivered with Content material-Sort: textual content/html headers as a substitute of the safe utility/json format, enabling browser execution of embedded JavaScript code. 

Attackers can inject malicious scripts utilizing crafted requests:

The exploitation turns into notably harmful when mixed with a CSRF token validation bypass achieved by HTTP technique tampering. 

The appliance’s reliance on the $_REQUEST superglobal permits attackers to transform POST requests to GET requests, fully circumventing CSRF safety mechanisms in embody/utils/VteCsrf.php.

This design flaw permits attackers to take advantage of XSS vulnerabilities with out requiring legitimate CSRF tokens, considerably reducing the assault complexity.

SQL Injection Vulnerability

The second authentication bypass vector leverages SQL injection vulnerabilities in modules/Fax/EditView.php to extract delicate person credentials and authentication tokens. 

The susceptible code constructs database queries by straight concatenating user-controlled enter:

Though ready statements are utilized, the $fieldname parameter stays unsanitized, permitting attackers to specify arbitrary database columns for extraction. 

Extra critically, attackers can leverage subquery injection to extract password reset tokens.

These extracted tokens allow instant password reset operations with out person interplay, offering full account takeover capabilities.

Direct Password Reset Vulnerability

Essentially the most extreme vulnerability, designated because the third assault vector, entails an arbitrary password reset flaw in hub/rpwd.php. 

This endpoint exposes a change_password motion that lacks sufficient safety validation, allowing password modification for any person account utilizing solely the goal username.

The susceptible code path in modules/Customers/RecoverPwd.php processes password change requests with out correct authentication verification:

The skipOldPwdCheck parameter set to true fully bypasses password verification, enabling attackers to reset any person’s credentials by a single HTTP request. This vulnerability was patched in model 25.02.1 following the analysis disclosure.

Distant Code Execution Flaw

As soon as authentication bypass is achieved, attackers can escalate to distant code execution by numerous methods. 

The appliance comprises a number of Native File Inclusion (LFI) vulnerabilities that settle for person enter in file inclusion features with out correct sanitization.

Crucial LFI vulnerabilities exist in:

modules/Settings/LayoutBlockListUtils.php

modules/Calendar/ActivityAjax.php

modules/Calendar/wdCalendar.php

Path traversal sequences (../) allow arbitrary file inclusion, with the limitation that concentrate on recordsdata should possess .php extensions. 

Whereas add restrictions stop direct PHP file uploads, researchers demonstrated RCE exploitation by pearcmd.php devices when the PEAR framework is current on course programs.

Moreover, vtenext directors can add customized modules by the ModuleManager interface, offering a direct pathway to RCE. 

Organizations using vtenext CRM ought to instantly improve to model 25.02.1 or later and implement extra safety measures to mitigate these important vulnerabilities. 

The seller’s delayed response to accountable disclosure makes an attempt highlights the significance of proactive safety monitoring and fast patch deployment in enterprise environments.

Discover this Story Fascinating! Comply with us on LinkedIn and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Authentication, Bypass, Codes, Execute, Multiple, Remote, vtenext, Vulnerabilities

Post navigation

Previous Post: Pakistani Hackers Back at Targeting Indian Government Entities
Next Post: Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

Related Posts

Search Engines are Indexing ChatGPT Conversations! Cyber Security News
Lazarus Subgroup ‘TraderTraitor’ Attacking Cloud Platforms and Poisoning Supply Chains Cyber Security News
New Crocodilus Malware That Gain Complete Control of Android Device Cyber Security News
Hive0156 Hackers Attacking Government and Military Organizations to Deploy Remcos RAT Cyber Security News
INE Named to Training Industry’s 2025 Top 20 Online Learning Library List Cyber Security News
10 Best Malware Analysis Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Hackers Using PUP Advertisements to Silently Drop Windows Malware
  • Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
  • Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • OneFlip: An Emerging Threat to AI that Could Make Vehicles Crash and Facial Recognition Fail
  • Proxyware Malware Mimic as YouTube Video Download Site Delivers Malicious Javascripts
  • Hackers Using PUP Advertisements to Silently Drop Windows Malware
  • Kimsuky APT Data Leak – GPKI Certificates, Rootkits and Cobalt Strike Personal Uncovered
  • Beware of Website Mimicking Google Play Store Pages to Deliver Android Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News