{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-6629/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2026-6629","sql-injection","web-application","metasoft"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eA SQL injection vulnerability, identified as CVE-2026-6629, has been discovered in Metasoft 美特软件 MetaCRM versions up to 6.4.0. The vulnerability resides within the \u003ccode\u003esql.jsp\u003c/code\u003e file, specifically affecting the \u003ccode\u003eStatement.executeUpdate\u003c/code\u003e function of the Interface component. The vulnerability allows remote attackers to inject arbitrary SQL commands by manipulating the \u003ccode\u003esql\u003c/code\u003e argument. Public exploit code is available, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat to organizations using the affected MetaCRM versions, potentially leading to data breaches, system compromise, and unauthorized access.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker identifies a Metasoft MetaCRM instance running a vulnerable version (\u0026lt;= 6.4.0).\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious HTTP request targeting the \u003ccode\u003esql.jsp\u003c/code\u003e file.\u003c/li\u003e\n\u003cli\u003eWithin the HTTP request, the attacker manipulates the \u003ccode\u003esql\u003c/code\u003e parameter to inject SQL code.\u003c/li\u003e\n\u003cli\u003eThe crafted SQL injection payload is passed to the \u003ccode\u003eStatement.executeUpdate\u003c/code\u003e function.\u003c/li\u003e\n\u003cli\u003eThe application executes the attacker-controlled SQL query against the underlying database.\u003c/li\u003e\n\u003cli\u003eThe database server executes the malicious SQL command.\u003c/li\u003e\n\u003cli\u003eThe attacker can read sensitive data from the database, modify existing data, or execute administrative commands.\u003c/li\u003e\n\u003cli\u003eThe attacker gains unauthorized access to the system, potentially leading to complete system compromise or data exfiltration.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this SQL injection vulnerability can lead to a range of severe consequences, including unauthorized data access, data modification, and complete system compromise. Attackers could steal sensitive customer data, financial records, or intellectual property. They might also be able to modify existing data to cause financial losses or disrupt business operations. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available. The CVSS score of 7.3 reflects the high potential impact of this vulnerability.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eInspect web server logs for suspicious POST requests targeting \u003ccode\u003esql.jsp\u003c/code\u003e with potentially malicious SQL queries in the \u003ccode\u003esql\u003c/code\u003e parameter to detect exploitation attempts. Reference the Sigma rule \u003ccode\u003eDetect-Metasoft-MetaCRM-SQL-Injection\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect-Metasoft-MetaCRM-SQL-Error\u003c/code\u003e to detect SQL errors that may indicate injection attempts.\u003c/li\u003e\n\u003cli\u003eApply input validation and sanitization to the \u003ccode\u003esql\u003c/code\u003e parameter in \u003ccode\u003esql.jsp\u003c/code\u003e to prevent SQL injection. This requires modifying the application code.\u003c/li\u003e\n\u003cli\u003eMonitor network traffic for unusual database activity originating from the web server, such as large data transfers or unauthorized access attempts.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-20T11:16:18Z","date_published":"2026-04-20T11:16:18Z","id":"/briefs/2026-04-metasoft-crm-sql-injection/","summary":"A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.","title":"Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)","url":"https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-6629","version":"https://jsonfeed.org/version/1.1"}