SQL Injection Flaw in MetaCRM Exposes Systems to Remote Attack
The National Vulnerability Database has disclosed CVE-2026-6629, a critical SQL injection vulnerability impacting Metasoft’s MetaCRM software up to version 6.4.0. Attackers can exploit this flaw remotely by manipulating arguments within the Statement.executeUpdate function in sql.jsp, leading to unauthorized data access or modification. The vendor was notified but failed to respond, leaving users exposed.
This vulnerability, rated High with a CVSS score of 7.3, allows unauthenticated attackers to inject malicious SQL code. Given the lack of vendor response, organizations relying on MetaCRM must assume this vulnerability is actively exploitable and may already be in the wild. The absence of specific affected product details from the NVD report means any deployment of MetaCRM 6.4.0 or earlier should be considered at risk.
What This Means For You
- If your organization uses Metasoft MetaCRM version 6.4.0 or earlier, immediately audit your systems. Since the vendor has not responded to disclosures, you cannot rely on a patch. Focus on network segmentation to isolate MetaCRM instances and review access logs for any unusual activity indicative of SQL injection attempts.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rule · 6 SIEM formats1 detection rule mapped to MITRE ATT&CK. Sigma YAML is free — copy below.
CVE-2026-6629 MetaCRM sql.jsp SQL Injection
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-6629 | SQLi | Metasoft 美特软件 MetaCRM up to 6.4.0 |
| CVE-2026-6629 | SQLi | sql.jsp::Statement.executeUpdate (component: Interface) |
| CVE-2026-6629 | SQLi | Manipulation of argument 'sql' |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | April 20, 2026 at 14:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.