We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A PHP object injection vulnerability exists in SugarCRM versions prior to 6.5.24, 6.7.13, 7.5.2.5, 7.6.2.2, and 7.7.1.0 due to improper validation of PHP serialized input in the SugarRestSerialize.php script. The vulnerable code fails to sanitize the rest_data parameter before passing it to the unserialize() function. This allows an unauthenticated attacker to submit crafted serialized data containing malicious object declarations, resulting in arbitrary code execution within the application context. Although SugarCRM released a prior fix in advisory sugarcrm-sa-2016-001, the patch was incomplete and failed to address some vectors.
Reserved 2025-01-31 | Published 2025-06-20 | Updated 2025-07-16 | Assigner VulnCheckCWE-502 Deserialization of Untrusted Data
Egidio Romano
web.archive.org/...ugarcrm.com/security/sugarcrm-sa-2016-008
web.archive.org/...ugarcrm.com/security/sugarcrm-sa-2016-001
karmainsecurity.com/KIS-2016-07
www.exploit-db.com/exploits/40344
raw.githubusercontent.com/...garcrm_rest_unserialize_exec.rb
www.sugarcrm.com/crm/
vulncheck.com/advisories/sugarcrm-php-deserialization-rce
Support options