Multiple vulnerabilities in Fairsketch's RISE CRM Framework

Posted date 11/11/2025
Identificador
INCIBE-2025-0626
Importance
3 - Medium
Affected Resources

RISE CRM Framework, versions prior to 3.9

Description

INCIBE has coordinated the publication of 6 medium-severity vulnerabilities that affect Fairsketch's RISE CRM Framework, a software similar to a CRM and project managing APP. This vulnerabilities were discovered by Gonzalo Aguilar García (6h4ack).

These vulnerabilities have been assigned the following codes, CVSS v4.0 base score, CVSS vector and CWE type of each vulnerability :

  • From CVE-2025-41101 to CVE-2025-41106: CVSS v4.0: 5.1 | CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N | CWE-79.
Solution

These vulnerabilities have been fixed by the Fairsketch team in version 3.9.

Detail

HTML injection vulnerability found in Fairsketch's RISE CRM Framework v3.8.1, which consist of an HTML code injection due to lack of proper validation of user inputs by sending a POST request. The list of assigned parameters and identifiers is as follows:

  • CVE-2025-41101: parameter 'title' in'/projects/save'.
  • CVE-2025-41102: parameter 'title' in '/events/save'.
  • CVE-2025-41103: parameter 'reply_message' in '/messages/reply'.
  • CVE-2025-41104: parameter 'custom_field_1' in '/estimate_requests/save_estimate_request'.
  • CVE-2025-41105: parameter 'title' in '/tickets/save'.
  • CVE-2025-41106: parameter 'first_name' in '/clients/save_contact/'.
CVE
Explotación
No
References list