CVE-2025-7876

A vulnerability classified as critical was found in Metasoft 美特软件 MetaCRM up to 6.4.2. This vulnerability affects the function AnalyzeParam of the file download.jsp. The manipulation of the argument p leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-RCE-3.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.316990 Permissions Required VDB Entry
https://vuldb.com/?id.316990 Third Party Advisory VDB Entry
https://vuldb.com/?submit.611048 Third Party Advisory VDB Entry
https://github.com/FightingLzn9/vul/blob/main/MetaCRM6-RCE-3.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:metasoft:metacrm:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-07-20 08:15

Updated : 2025-08-27 17:29


NVD link : CVE-2025-7876

Mitre link : CVE-2025-7876

CVE.ORG link : CVE-2025-7876


JSON object : View

Products Affected

metasoft

  • metacrm
CWE
CWE-20

Improper Input Validation

CWE-502

Deserialization of Untrusted Data