Vulnerability Description
EspoCRM is an Open Source Customer Relationship Management software. An attacker can inject arbitrary IP or domain in "Password Change" page and redirect victim to malicious page that could lead to credential stealing or another attack. This vulnerability is fixed in 8.1.2.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Espocrm | Espocrm | < 8.1.2 |
Related Weaknesses (CWE)
References
- https://github.com/espocrm/espocrm/commit/3babdfa3399e328fb1bd83a1b4ed03d509f4c8Patch
- https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7jExploitVendor Advisory
- https://github.com/espocrm/espocrm/commit/3babdfa3399e328fb1bd83a1b4ed03d509f4c8Patch
- https://github.com/espocrm/espocrm/security/advisories/GHSA-8gv6-8r33-fm7jExploitVendor Advisory
FAQ
What is CVE-2024-24818?
CVE-2024-24818 is a vulnerability with a CVSS score of 5.9 (MEDIUM). EspoCRM is an Open Source Customer Relationship Management software. An attacker can inject arbitrary IP or domain in "Password Change" page and redirect victim to malicious page that could lead to c...
How severe is CVE-2024-24818?
CVE-2024-24818 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-24818?
Check the references section above for vendor advisories and patch information. Affected products include: Espocrm Espocrm.