Vulnerability Description
EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below allow authenticated users to upload SVG attachments through normal attachment-capable fields and later serve those SVG files as top-level inline documents through both the attachment and image entry points, resulting in stored cross-user XSS reachable through a normal attachment workflow. Although inline SVG script is blocked by the response CSP, the same CSP still allows same-origin external script. As a result, an attacker can upload a malicious SVG together with a second attacker-controlled JavaScript attachment, then trick another user into opening the SVG to execute JavaScript in the victim's EspoCRM origin. This issue has been fixed in version 9.3.4.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/espocrm/espocrm/security/advisories/GHSA-5wh5-ccv2-m3pv
- https://github.com/espocrm/espocrm/security/advisories/GHSA-5wh5-ccv2-m3pv
FAQ
What is CVE-2026-33741?
CVE-2026-33741 is a vulnerability with a CVSS score of 6.8 (MEDIUM). EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below allow authenticated users to upload SVG attachments through normal attachment-capable fields and later ...
How severe is CVE-2026-33741?
CVE-2026-33741 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-33741?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.