<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-6629 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-6629/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 20 Apr 2026 11:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-6629/feed.xml" rel="self" type="application/rss+xml"/><item><title>Metasoft MetaCRM SQL Injection Vulnerability (CVE-2026-6629)</title><link>https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</link><pubDate>Mon, 20 Apr 2026 11:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-metasoft-crm-sql-injection/</guid><description>A SQL injection vulnerability (CVE-2026-6629) exists in Metasoft MetaCRM up to version 6.4.0, allowing remote attackers to execute arbitrary SQL commands via manipulation of the sql argument in the Statement.executeUpdate function of the sql.jsp file.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability, identified as CVE-2026-6629, has been discovered in Metasoft 美特软件 MetaCRM versions up to 6.4.0. The vulnerability resides within the <code>sql.jsp</code> file, specifically affecting the <code>Statement.executeUpdate</code> function of the Interface component. The vulnerability allows remote attackers to inject arbitrary SQL commands by manipulating the <code>sql</code> argument. Public exploit code is available, increasing the risk of exploitation. The vendor was notified but did not respond. This vulnerability poses a significant threat to organizations using the affected MetaCRM versions, potentially leading to data breaches, system compromise, and unauthorized access.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a Metasoft MetaCRM instance running a vulnerable version (&lt;= 6.4.0).</li>
<li>The attacker crafts a malicious HTTP request targeting the <code>sql.jsp</code> file.</li>
<li>Within the HTTP request, the attacker manipulates the <code>sql</code> parameter to inject SQL code.</li>
<li>The crafted SQL injection payload is passed to the <code>Statement.executeUpdate</code> function.</li>
<li>The application executes the attacker-controlled SQL query against the underlying database.</li>
<li>The database server executes the malicious SQL command.</li>
<li>The attacker can read sensitive data from the database, modify existing data, or execute administrative commands.</li>
<li>The attacker gains unauthorized access to the system, potentially leading to complete system compromise or data exfiltration.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to a range of severe consequences, including unauthorized data access, data modification, and complete system compromise. Attackers could steal sensitive customer data, financial records, or intellectual property. They might also be able to modify existing data to cause financial losses or disrupt business operations. The lack of vendor response exacerbates the risk, as no official patch or mitigation is available. The CVSS score of 7.3 reflects the high potential impact of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Inspect web server logs for suspicious POST requests targeting <code>sql.jsp</code> with potentially malicious SQL queries in the <code>sql</code> parameter to detect exploitation attempts. Reference the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Injection</code>.</li>
<li>Deploy the Sigma rule <code>Detect-Metasoft-MetaCRM-SQL-Error</code> to detect SQL errors that may indicate injection attempts.</li>
<li>Apply input validation and sanitization to the <code>sql</code> parameter in <code>sql.jsp</code> to prevent SQL injection. This requires modifying the application code.</li>
<li>Monitor network traffic for unusual database activity originating from the web server, such as large data transfers or unauthorized access attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-6629</category><category>sql-injection</category><category>web-application</category><category>metasoft</category></item></channel></rss>