EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.
History

Thu, 17 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 16 Apr 2025 22:00:00 +0000

Type Values Removed Values Added
Description EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.
Title EspoCRM Allows Potential Disclosure of Sensitive Information in the User Sorting Function
Weaknesses CWE-200
CWE-203
References
Metrics cvssV3_1

{'score': 3.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-17T13:14:36.548Z

Reserved: 2025-04-10T12:51:12.280Z

Link: CVE-2025-32789

cve-icon Vulnrichment

Updated: 2025-04-17T13:14:26.636Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-16T22:15:14.800

Modified: 2025-04-17T20:21:48.243

Link: CVE-2025-32789

cve-icon Redhat

No data.