CVE-2025-32789

EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.
Configurations

No configuration.

History

17 Apr 2025, 14:15

Type Values Removed Values Added
References () https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53 - () https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53 -

16 Apr 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-16 22:15

Updated : 2025-04-17 20:21


NVD link : CVE-2025-32789

Mitre link : CVE-2025-32789

CVE.ORG link : CVE-2025-32789


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-203

Observable Discrepancy