First published: Mon May 12 2025(Updated: )
EspoCRM is a free, open-source customer relationship management platform. Prior to version 9.0.8, HTML Injection in Knowledge Base (KB) articles leads to complete page defacement imitating the login page. Authenticated users with the read knowledge article privilege can browse to the KB article and if they submit their credentials, they get captured in plain text. The vulnerability is allowed by overly permissive HTML editing being allowed on the KB articles. Any authenticated user with the privilege to read KB articles is impacted. In an enterprise with multiple applications, the malicious KB article could be edited to match the login pages of other applications, which would make it useful for credential harvesting against other applications as well. Version 9.0.8 contains a patch for the issue.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
EspoCRM | <9.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-32390 is classified as a medium severity vulnerability due to the risk of HTML Injection leading to page defacement.
To fix CVE-2025-32390, upgrade your EspoCRM to version 9.0.8 or later, which addresses this vulnerability.
CVE-2025-32390 affects all versions of EspoCRM prior to version 9.0.8.
CVE-2025-32390 is an HTML Injection vulnerability found in the Knowledge Base articles of EspoCRM.
Authenticated users with the read knowledge article privilege can exploit CVE-2025-32390 to perform HTML Injection.