๐Ÿ” CVE Alert

CVE-2019-25664

HIGH 7.1

SuiteCRM 7.10.7 SQL Injection via record Parameter

CVSS Score
7.1
EPSS Score
0.0%
EPSS Percentile
7th

SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques.

CWE CWE-89
Vendor suitecrm
Product suitecrm
Published Apr 5, 2026
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for suitecrm suitecrm

Be the first to know when new high vulnerabilities affecting suitecrm suitecrm are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
Low
Availability
None

Affected Versions

Suitecrm / SuiteCRM
7.10.7

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
exploit-db.com: https://www.exploit-db.com/exploits/46311 suitecrm.com: https://suitecrm.com/ suitecrm.com: https://suitecrm.com/download/ vulncheck.com: https://www.vulncheck.com/advisories/suitecrm-sql-injection-via-record-parameter

Credits

Mehmet EMIROGLU