Description
A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6.4.0. This vulnerability affects the function Statement.executeUpdate of the file sql.jsp of the component Interface. Such manipulation of the argument sql leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-04-20
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Patch
AI Analysis

Impact

The vulnerability is a SQL injection flaw in the Statement.executeUpdate method of the sql.jsp interface of Metasoft 美特软件 MetaCRM. By manipulating the sql argument, an attacker can inject arbitrary SQL code through a remote request, potentially compromising the confidentiality and integrity of the underlying database. The weakness is classified under CWE-74 and CWE-89, indicating problematic input handling and SQL injection.

Affected Systems

All installations of Metasoft 美特软件 MetaCRM versions up to and including 6.4.0 are affected. No specific version beyond 6.4.0 has been identified as patched, so any deployment within that range remains vulnerable.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity vulnerability. The EPSS score is not available, so the current exploitation probability is unknown, but the vulnerability has been publicly disclosed and may be used by attackers. It is not listed in CISA's KEV catalog. Remote exploitation is possible, with no obvious local privilege or authenticated prerequisites mentioned, so unprivileged remote users could potentially exploit the flaw.

Generated by OpenCVE AI on April 20, 2026 at 11:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest official patch or upgrade to a version released after 6.4.0, if available from Metasoft.
  • Restrict network access to the sql.jsp interface, limiting it to trusted hosts or internal networks only.
  • Implement strict input validation and use parameterized queries or prepared statements in the application code, following CWE-89 best practices.

Generated by OpenCVE AI on April 20, 2026 at 11:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Metasoft
Metasoft metacrm
Vendors & Products Metasoft
Metasoft metacrm

Mon, 20 Apr 2026 10:45:00 +0000

Type Values Removed Values Added
Description A vulnerability has been found in Metasoft 美特软件 MetaCRM up to 6.4.0. This vulnerability affects the function Statement.executeUpdate of the file sql.jsp of the component Interface. Such manipulation of the argument sql leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Metasoft 美特软件 MetaCRM Interface sql.jsp Statement.executeUpdate sql injection
Weaknesses CWE-74
CWE-89
References
Metrics cvssV2_0

{'score': 7.5, 'vector': 'AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 7.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 7.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Metasoft Metacrm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-20T15:21:18.092Z

Reserved: 2026-04-19T16:49:09.118Z

Link: CVE-2026-6629

cve-icon Vulnrichment

Updated: 2026-04-20T15:21:09.674Z

cve-icon NVD

Status : Received

Published: 2026-04-20T11:16:18.927

Modified: 2026-04-20T11:16:18.927

Link: CVE-2026-6629

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T14:45:08Z

Weaknesses