Critical severity9.1NVD Advisory· Published Apr 22, 2026· Updated Apr 27, 2026
CVE-2026-33656
CVE-2026-33656
Description
EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, EspoCRM's built-in formula scripting engine allowing updating attachment's sourceId thus allowing an authenticated admin to overwrite the sourceId field on Attachment entities. Because sourceId is concatenated directly into a file path with no sanitization in EspoUploadDir::getFilePath(), an attacker can redirect any file read or write operation to an arbitrary path within the web server's open_basedir scope. Version 9.3.4 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/espocrm/espocrm/security/advisories/GHSA-7922-x7cf-j54xnvdExploitVendor Advisory
News mentions
0No linked articles in our index yet.