Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2026-33656 β€” AI Deep Analysis Summary

CVSS 9.1 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: A Path Traversal vulnerability in EspoCRM's formula script engine. πŸ“‰ **Consequences**: Authenticated admins can overwrite the `sourceId` of attachments.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-22 (Path Traversal)**. πŸ› **Flaw**: The `EspoUploadDir::getFilePath` function concatenates the `sourceId` directly into the file path **without sanitization**.…

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: EspoCRM. πŸ“¦ **Product**: EspoCRM (Open-source Web CRM). πŸ“… **Affected Versions**: **Before 9.3.4**. βœ… **Fixed Version**: 9.3.4 or later.

Q4What can hackers do? (Privileges/Data)

πŸ•΅οΈ **Privileges Required**: **Authenticated Administrator**. 🎯 **Capabilities**: Can overwrite attachment `sourceId` fields. πŸ“‚ **Data Impact**: Can read/write **any file** within the web server's `open_basedir` range.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”’ **Threshold**: **Medium/High**. 🚫 **Barrier**: Requires **Authenticated Admin** privileges. 🚫 **No UI**: No user interaction needed (UI:N). 🌐 **Network**: Remote exploitation possible (AV:N).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“œ **Public Exploit**: **No**. 🚫 **PoC Status**: The `pocs` array is empty in the data. πŸ” **Reference**: Official advisory exists (GHSA-7922-x7cf-j54x), but no wild exploitation code is currently public.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: 1. Verify EspoCRM version < 9.3.4. 2. Check for admin account exposure. 3. Scan for formula script engine usage in attachments. πŸ› οΈ **Tooling**: Use version fingerprinting tools.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: **Yes**. πŸ“¦ **Patch**: Upgrade to **EspoCRM 9.3.4** or newer. πŸ”— **Source**: Official GitHub Security Advisory (GHSA-7922-x7cf-j54x). πŸ”„ **Action**: Immediate update recommended for all affected instances.

Q9What if no patch? (Workaround)

🚧 **Workaround**: 1. **Restrict Admin Access**: Limit who has admin privileges. 2. **Input Validation**: If possible, patch the `EspoUploadDir::getFilePath` logic to sanitize `sourceId`. 3.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: **High**. πŸ“Š **CVSS**: 9.8 (Critical). πŸ“ˆ **Priority**: **P1**. ⚑ **Reason**: Although it requires admin auth, the impact is full file system access within `open_basedir`.…