We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-52892

EspoCRM is vulnerable to access denial through double slash in URI corrupting router cache



Description

EspoCRM is a web application with a frontend designed as a single-page application and a REST API backend written in PHP. In versions 9.1.6 and below, if a user loads Espo in the browser with double slashes (e.g https://domain//#Admin) and the webserver does not strip the double slash, it can cause a corrupted Slim router's cache. This will make the instance unusable until there is a completed rebuild. This is fixed in version 9.1.7.

Reserved 2025-06-20 | Published 2025-08-05 | Updated 2025-08-05 | Assigner GitHub_M


MEDIUM: 4.5CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H

Problem types

CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Product status

< 9.1.7
affected

References

github.com/...spocrm/security/advisories/GHSA-26x2-6wch-j8pf

github.com/...ommit/929611f317ce8892ea75873b0ab3094c0c510ff3

cve.org (CVE-2025-52892)

nvd.nist.gov (CVE-2025-52892)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-52892

Support options

Helpdesk Chat, Email, Knowledgebase