CVE-2025-70981

Critical
|9.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to manipulate the employee list query in CordysCRM, potentially gaining unauthorized access to sensitive data stored in the database. It requires the attacker to send specially crafted input through the departmentIds parameter in the user list interface.

Technical Description

CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade APatched in 6 days

Quick Information

Published

Feb 12, 2026

8 days ago

Last Modified

Feb 18, 2026

2 days ago

Vendor

fit2cloud

Product

cordys crm