Sploit.io - Search

Product: F-RevoCRM, version: 7.3 series prior to version7.3.8

CVE-2023-41150

Severity: Unknown

Description: F-RevoCRM 7.3 series prior to version7.3.8 contains a cross-site scripting vulnerability. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is using the product.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.002550000
  • Percentile: 0.489160000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9116
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Thinkingreed Inc. F-RevoCRM - Versions: 7.3 series prior to version7.3.8

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2023-41150, is a cross-site scripting (XSS) vulnerability present in F-RevoCRM version 7.3 series prior to version 7.3.8. XSS vulnerabilities allow attackers to inject malicious scripts into web pages viewed by other users. The business impact of this vulnerability can range from minor annoyance to significant compromise, depending on the privileges of the affected user and the nature of the injected script. The likelihood of exploitation is moderate, as XSS vulnerabilities are frequently targeted and relatively easy to exploit, particularly if user input is not thoroughly sanitized. The ease of exploitation is also moderate, as the attacker needs to find a suitable input field to inject the script. A successful exploit could compromise the confidentiality of user data (e.g., session cookies, authentication tokens), integrity of data entered into the CRM (e.g., customer records), and potentially the availability of the CRM system if the script causes a denial-of-service condition. The EPSS score of 0.002550000 indicates a relatively low, but still present, exploitation probability.

    2. Potential Attack Scenarios
    A potential attack scenario involves an attacker exploiting the XSS vulnerability through a maliciously crafted link sent to a F-RevoCRM user. The attacker crafts a link containing a malicious JavaScript payload, perhaps designed to steal the user's session cookie. The user clicks on the link, which leads them to a vulnerable page within the F-RevoCRM instance. The injected script executes in the user's browser. The script steals the user's session cookie and sends it to a server controlled by the attacker. The attacker can then use the stolen session cookie to impersonate the user and access the CRM with their privileges. Depending on the user's role, this could allow the attacker to view sensitive customer data, modify records, or even perform administrative actions.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2023-41150 is to upgrade F-RevoCRM to version 7.3.8 or later. This version includes the fix for the XSS vulnerability. As an immediate action, organizations using F-RevoCRM 7.3 series should prioritize patching to version 7.3.8. In the interim, organizations can implement input validation and output encoding to sanitize user input before it is displayed in web pages. This can help to prevent malicious scripts from being executed. Consider using a Web Application Firewall (WAF) to filter out malicious traffic and further mitigate the risk of XSS attacks. Refer to the official F-RevoCRM release notes and the JPCERT advisory for more detailed information: https://f-revocrm.jp/2023/08/9394/ and http://jvn.jp/en/jp/JVN78113802/.

    4. Executive Summary
    F-RevoCRM versions 7.3 series prior to 7.3.8 contain a cross-site scripting vulnerability that could allow attackers to execute malicious scripts in the browsers of users accessing the CRM system. This could lead to the theft of user credentials, modification of customer data, or even disruption of CRM service. While the probability of exploitation is moderate, the potential impact on data confidentiality, integrity, and availability warrants prompt action. We recommend upgrading to F-RevoCRM version 7.3.8 as soon as possible. This upgrade will eliminate the vulnerability and protect your organization's valuable customer data and CRM operations. Implementing additional security measures such as input validation and a Web Application Firewall can provide further protection. Addressing this vulnerability is crucial for maintaining the security and reliability of your F-RevoCRM deployment.