EspoCRM is a free, open-source customer relationship management platform. Prior to version 9.0.8, HTML Injection in Knowledge Base (KB) articles leads to complete page defacement imitating the login page. Authenticated users with the read knowledge article privilege can browse to the KB article and if they submit their credentials, they get captured in plain text. The vulnerability is allowed by overly permissive HTML editing being allowed on the KB articles. Any authenticated user with the privilege to read KB articles is impacted. In an enterprise with multiple applications, the malicious KB article could be edited to match the login pages of other applications, which would make it useful for credential harvesting against other applications as well. Version 9.0.8 contains a patch for the issue.
References
Link | Resource |
---|---|
https://github.com/espocrm/espocrm/commit/6b58d30eec8864de52844bfb8dac346ce5c729d7 | Patch |
https://github.com/espocrm/espocrm/security/advisories/GHSA-qrwp-v8v3-hqp2 | Exploit Vendor Advisory |
Configurations
History
17 Jun 2025, 19:41
Type | Values Removed | Values Added |
---|---|---|
First Time |
Espocrm espocrm
Espocrm |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.5 |
Summary |
|
|
References | () https://github.com/espocrm/espocrm/commit/6b58d30eec8864de52844bfb8dac346ce5c729d7 - Patch | |
References | () https://github.com/espocrm/espocrm/security/advisories/GHSA-qrwp-v8v3-hqp2 - Exploit, Vendor Advisory | |
CPE | cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:* |
12 May 2025, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-05-12 11:15
Updated : 2025-06-17 19:41
NVD link : CVE-2025-32390
Mitre link : CVE-2025-32390
CVE.ORG link : CVE-2025-32390
JSON object : View
Products Affected
espocrm
- espocrm
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')