Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Multiple vtenext Vulnerabilities Let Attackers Bypass Authentication and Execute Remote Codes

Posted on August 25, 2025August 25, 2025 By CWS

A complete safety evaluation of vtenext CRM model 25.02 has revealed a number of important vulnerabilities that enable unauthenticated attackers to bypass authentication mechanisms by three distinct assault vectors, in the end resulting in distant code execution on course programs. 

The Italian CRM answer, utilized by quite a few small and medium enterprises throughout Italy, faces important safety publicity regardless of tried vendor notifications.

Key Takeaways1. Three authentication bypasses let attackers impersonate any person.2. Put up‐login, LFI and module‐add flaws allow distant code execution.3. Solely the password‐reset subject was silently patched; others nonetheless want fixes.

XSS and Session Hijacking

Sicuranext studies that the primary assault vector exploits a vulnerability chain combining mirrored Cross-Web site Scripting (XSS), CSRF token bypass, and session cookie disclosure. 

A important flaw in modules/Dwelling/HomeWidgetBlockList.php the place the widgetId parameter undergoes inadequate sanitization earlier than reflection in server responses.

The vulnerability manifests when JSON responses containing malicious payloads are delivered with Content material-Sort: textual content/html headers as a substitute of the safe utility/json format, enabling browser execution of embedded JavaScript code. 

Attackers can inject malicious scripts utilizing crafted requests:

The exploitation turns into notably harmful when mixed with a CSRF token validation bypass achieved by HTTP technique tampering. 

The appliance’s reliance on the $_REQUEST superglobal permits attackers to transform POST requests to GET requests, fully circumventing CSRF safety mechanisms in embody/utils/VteCsrf.php.

This design flaw permits attackers to take advantage of XSS vulnerabilities with out requiring legitimate CSRF tokens, considerably reducing the assault complexity.

SQL Injection Vulnerability

The second authentication bypass vector leverages SQL injection vulnerabilities in modules/Fax/EditView.php to extract delicate person credentials and authentication tokens. 

The susceptible code constructs database queries by straight concatenating user-controlled enter:

Though ready statements are utilized, the $fieldname parameter stays unsanitized, permitting attackers to specify arbitrary database columns for extraction. 

Extra critically, attackers can leverage subquery injection to extract password reset tokens.

These extracted tokens allow instant password reset operations with out person interplay, offering full account takeover capabilities.

Direct Password Reset Vulnerability

Essentially the most extreme vulnerability, designated because the third assault vector, entails an arbitrary password reset flaw in hub/rpwd.php. 

This endpoint exposes a change_password motion that lacks sufficient safety validation, allowing password modification for any person account utilizing solely the goal username.

The susceptible code path in modules/Customers/RecoverPwd.php processes password change requests with out correct authentication verification:

The skipOldPwdCheck parameter set to true fully bypasses password verification, enabling attackers to reset any person’s credentials by a single HTTP request. This vulnerability was patched in model 25.02.1 following the analysis disclosure.

Distant Code Execution Flaw

As soon as authentication bypass is achieved, attackers can escalate to distant code execution by numerous methods. 

The appliance comprises a number of Native File Inclusion (LFI) vulnerabilities that settle for person enter in file inclusion features with out correct sanitization.

Crucial LFI vulnerabilities exist in:

modules/Settings/LayoutBlockListUtils.php

modules/Calendar/ActivityAjax.php

modules/Calendar/wdCalendar.php

Path traversal sequences (../) allow arbitrary file inclusion, with the limitation that concentrate on recordsdata should possess .php extensions. 

Whereas add restrictions stop direct PHP file uploads, researchers demonstrated RCE exploitation by pearcmd.php devices when the PEAR framework is current on course programs.

Moreover, vtenext directors can add customized modules by the ModuleManager interface, offering a direct pathway to RCE. 

Organizations using vtenext CRM ought to instantly improve to model 25.02.1 or later and implement extra safety measures to mitigate these important vulnerabilities. 

The seller’s delayed response to accountable disclosure makes an attempt highlights the significance of proactive safety monitoring and fast patch deployment in enterprise environments.

Discover this Story Fascinating! Comply with us on LinkedIn and X to Get Extra Prompt Updates.

Cyber Security News Tags:Attackers, Authentication, Bypass, Codes, Execute, Multiple, Remote, vtenext, Vulnerabilities

Post navigation

Previous Post: Pakistani Hackers Back at Targeting Indian Government Entities
Next Post: 0-Click Zendesk Account Takeover Vulnerability Enables Access to all Zendesk Tickets

Related Posts

Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Weaponized ScreenConnect RMM Tool Tricks Users into Downloading Xworm RAT Cyber Security News
Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit Cyber Security News
Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk Cyber Security News
Apple Aims to Fix iPhone Bug Removing Czech Character Apple Aims to Fix iPhone Bug Removing Czech Character Cyber Security News
New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures New Phishing Kit Automates Generation of ClickFix Attack Bypassing Security Measures Cyber Security News
Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table Hackers Using Malicious Imageless QR Codes to Render Phishing Attack Via HTML Table Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • VMware Fusion Vulnerability Receives Critical Update
  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark