EspoCRM is an open source customer relationship management application. In versions before 9.1.9, a vulnerability allows arbitrary user creation, including administrative accounts, through a combination of stored SVG injection and lack of CSRF protection. An attacker with Knowledge Base edit permissions can embed a malicious SVG element containing a link in the body field of an article. When an authenticated user clicks the malicious link, they are redirected to an attacker-controlled HTML page that executes a CSRF request against the api/v1/User endpoint. If the victim is prompted for and enters their credentials, an attacker-controlled account is created with privileges determined by the CSRF payload. This issue has been patched in version 9.1.9.
References
Link | Resource |
---|---|
https://github.com/espocrm/espocrm/security/advisories/GHSA-c26c-wvhr-fr6r | Exploit Mitigation Vendor Advisory |
Configurations
History
20 Oct 2025, 18:12
Type | Values Removed | Values Added |
---|---|---|
First Time |
Espocrm espocrm
Espocrm |
|
CPE | cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:* | |
CWE | CWE-79 | |
References | () https://github.com/espocrm/espocrm/security/advisories/GHSA-c26c-wvhr-fr6r - Exploit, Mitigation, Vendor Advisory |
14 Oct 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-10-14 15:16
Updated : 2025-10-20 18:12
NVD link : CVE-2025-59428
Mitre link : CVE-2025-59428
CVE.ORG link : CVE-2025-59428
JSON object : View
Products Affected
espocrm
- espocrm