Home

Description

EspoCRM is an open source customer relationship management application. In versions before 9.1.9, a vulnerability allows arbitrary user creation, including administrative accounts, through a combination of stored SVG injection and lack of CSRF protection. An attacker with Knowledge Base edit permissions can embed a malicious SVG element containing a link in the body field of an article. When an authenticated user clicks the malicious link, they are redirected to an attacker-controlled HTML page that executes a CSRF request against the api/v1/User endpoint. If the victim is prompted for and enters their credentials, an attacker-controlled account is created with privileges determined by the CSRF payload. This issue has been patched in version 9.1.9.

PUBLISHED Reserved 2025-09-15 | Published 2025-10-14 | Updated 2025-10-14 | Assigner GitHub_M




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-352: Cross-Site Request Forgery (CSRF)

Product status

< 9.1.9
affected

References

github.com/...spocrm/security/advisories/GHSA-c26c-wvhr-fr6r

cve.org (CVE-2025-59428)

nvd.nist.gov (CVE-2025-59428)

Download JSON