High severity7.2NVD Advisory· Published Apr 22, 2026· Updated Apr 27, 2026
CVE-2026-33733
CVE-2026-33733
Description
EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controlled name and scope values and pass them into template path construction without normalization or traversal filtering. As a result, an authenticated admin can use ../ sequences to escape the intended template directory and read, create, overwrite, or delete arbitrary files that resolve to body.tpl or subject.tpl under the web application user's filesystem permissions. Version 9.3.4 fixes the issue.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/espocrm/espocrm/security/advisories/GHSA-44c3-xjfp-3jrhnvdExploitMitigationVendor Advisory
News mentions
0No linked articles in our index yet.