Description
A flaw has been found in phili67 Ecclesia CRM up to 8.0.0. This affects the function ValidateInput of the file /v2/query/view/ of the component Query Viewer Component. This manipulation of the argument custom causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL injection that may expose confidential data
Action: Immediate Patch
AI Analysis

Impact

The flaw exists in the validate input routine for the custom query argument within the Query Viewer component of Ecclesia CRM. An attacker can supply crafted input in the custom parameter of the /v2/query/view/ endpoint, causing user‑supplied data to be inserted unchecked into an SQL statement. This lack of proper input validation leads to a classic SQL injection weakness (CWE‑74 and CWE‑89) that can allow compromise of the underlying database, unauthorized disclosure of sensitive information, and potentially further exploitation of the application.

Affected Systems

All installations of phili67 Ecclesia CRM version 8.0.0 or earlier are affected. The vulnerability resides in the Query Viewer Component accessed via the /v2/query/view/ API endpoint. No higher or lower version indications are available, so all releases up to 8.0.0 are presumed vulnerable.

Risk and Exploitability

With a CVSS score of 5.3 the vulnerability is moderate in severity. The EPSS score is not available, and the issue is not listed in the CISA KEV catalog. The attack can be launched remotely over HTTP or HTTPS by supplying malicious content in the custom query parameter, and published exploit code exists. Given the remote nature and potential data exposure, the risk is non‑negligible and warrants prompt attention.

Generated by OpenCVE AI on April 20, 2026 at 11:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an updated version of Ecclesia CRM that eliminates the SQL injection flaw, if one is available from the vendor or community sources.
  • If no patch exists, restrict network access to the /v2/query/view/ endpoint or disable the Query Viewer component entirely to prevent external exploitation.
  • Configure a web application firewall or intrusion detection rule to block requests that attempt to inject SQL syntax into the custom parameter.
  • Regularly audit database logs for anomalous queries that contain suspicious patterns indicative of injection attempts.

Generated by OpenCVE AI on April 20, 2026 at 11:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Phili67
Phili67 ecclesia Crm
Vendors & Products Phili67
Phili67 ecclesia Crm

Mon, 20 Apr 2026 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Description A flaw has been found in phili67 Ecclesia CRM up to 8.0.0. This affects the function ValidateInput of the file /v2/query/view/ of the component Query Viewer Component. This manipulation of the argument custom causes sql injection. The attack can be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title phili67 Ecclesia CRM Query Viewer view ValidateInput sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phili67 Ecclesia Crm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T10:54:35.730Z

Reserved: 2026-04-19T16:46:51.685Z

Link: CVE-2026-6628

cve-icon Vulnrichment

Updated: 2026-04-20T10:54:27.449Z

cve-icon NVD

Status : Received

Published: 2026-04-20T10:16:18.147

Modified: 2026-04-20T10:16:18.147

Link: CVE-2026-6628

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:57:52Z

Weaknesses