Vulnerability Description
EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Espocrm | Espocrm | < 9.0.7 |
Related Weaknesses (CWE)
References
- https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0aPatch
- https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9Patch
- https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53ExploitVendor Advisory
- https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53ExploitVendor Advisory
FAQ
What is CVE-2025-32789?
CVE-2025-32789 is a vulnerability with a CVSS score of 3.1 (LOW). EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash...
How severe is CVE-2025-32789?
CVE-2025-32789 has been rated LOW with a CVSS base score of 3.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-32789?
Check the references section above for vendor advisories and patch information. Affected products include: Espocrm Espocrm.