First published: Sun Jul 28 2019(Updated: )
EspoCRM version 5.6.4 is vulnerable to stored XSS due to lack of filtration of user-supplied data in the api/v1/Document functionality for storing documents in the account tab. An attacker can upload a crafted file that contains JavaScript code in its name. This code will be executed when a user opens a page of any profile with this.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
EspoCRM | =5.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14349 is a vulnerability in EspoCRM version 5.6.4 that allows an attacker to execute JavaScript code when a user opens a specially crafted file.
An attacker can upload a file with JavaScript code in its name, which will be executed when a user opens the file.
CVE-2019-14349 has a severity value of 6.1, which is considered medium.
EspoCRM version 5.6.4 is affected by CVE-2019-14349.
At the moment, there is no official fix available for CVE-2019-14349. It is recommended to update to a newer version when a fix is released.