top of page
perceptive_background_267k.jpg

EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controll…

Published:

21 april 2026 om 22:00:00

Alert date:

22 april 2026 om 22:11:22

Source:

nvd.nist.gov

Click to open the original link from this advisory

Web Technologies, Enterprise Applications

EspoCRM versions prior to 9.3.4 contain a path traversal vulnerability in admin template management endpoints. Authenticated administrators can exploit this flaw by using '../' sequences in 'name' and 'scope' parameters to escape the intended template directory. This allows attackers to read, create, overwrite, or delete arbitrary files with .tpl extensions within the web application's filesystem permissions. The vulnerability affects template path construction due to lack of proper normalization or traversal filtering. Version 9.3.4 addresses this security issue.

Technical details

Mitigation steps:

Affected products:

EspoCRM

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page