EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Apr 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7. | |
Title | EspoCRM Allows Potential Disclosure of Sensitive Information in the User Sorting Function | |
Weaknesses | CWE-200 CWE-203 |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-04-17T13:14:36.548Z
Reserved: 2025-04-10T12:51:12.280Z
Link: CVE-2025-32789

Updated: 2025-04-17T13:14:26.636Z

Status : Awaiting Analysis
Published: 2025-04-16T22:15:14.800
Modified: 2025-04-17T20:21:48.243
Link: CVE-2025-32789

No data.