Post

Vtenext 25.02 vulnerability research

Multiple vulnerabilities in vtenext 25.02.1 and prior versions allow unauthenticated attackers to bypass authentication through three separate vectors, ultimately leading to remote code execution on the underlying server.

Vtenext 25.02 vulnerability research

Summary

Product
VTENEXT CRM
Vendor
vtenext
Severity
Critical
Impact
Authentication Bypass and Remote Code Execution
Affected Version(s)
25.02* and below
Tested Version(s)
20.04, 24.02, 25.02, 25.02.1
First Patched Version
25.02.2

Abstract

Multiple vulnerabilities in vtenext 25.02.1 and prior versions allow unauthenticated attackers to bypass authentication through three separate vectors, ultimately leading to remote code execution on the underlying server.

You can read the full article on the SicuraNext blog.

Disclosure Timeline

Please refer to the disclosure policy page for further details about the disclosure policy adopted by 0xbro.

  • 28/05/2025: Contacted vtenext for the first time through various communication channels, but did not receive any response.
  • 05/06/2025: Contacted vtenext for the second time, but didn’t receive any response again.
  • 09/06/2025: Submitted CVE Request 1879483 to MITRE (still awaiting official CVEs).
  • 13/07/2025: Attempted to contact the developers of vtenext via a direct channel on LinkedIn, but without success.
  • 24/07/2025: Vendor released version 25.02.1 containing a silent patch for the Arbitrary Password Reset vulnerability.
  • 12/08/2025: Full disclosure, since a patch exists and the grace period has expired.
  • ??/08/2025: Vendor released version 25.02.2 containing a patch for the other vulnerabilities.
  • 04/09/2025: Following a call with the vtenext team, it was decided to reduce the technical details of the vulnerabilities to give users time to update to the latest version and the team time to patch the remaining vulnerabilities.
This post is licensed under CC BY 4.0 by the author.