top of page
perceptive_background_267k.jpg

EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, EspoCRM's built-in formula scripting engine allowing updating at…

Published:

21 april 2026 om 22:00:00

Alert date:

22 april 2026 om 22:11:22

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

CVE-2026-33656 affects EspoCRM versions prior to 9.3.4. The vulnerability exists in the built-in formula scripting engine that allows authenticated administrators to update attachment sourceId fields. Due to lack of input sanitization in EspoUploadDir::getFilePath(), attackers can manipulate the sourceId field to redirect file operations to arbitrary paths within the web server's open_basedir scope. This path traversal vulnerability enables unauthorized file read/write operations. The issue has been fixed in version 9.3.4.

Technical details

Mitigation steps:

Affected products:

EspoCRM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page