🔐 CVE Alert

CVE-2023-5966

MEDIUM 4.7

Unrestricted Upload of File with Dangerous Type in EspoCRM

CVSS Score
4.7
EPSS Score
0.9%
EPSS Percentile
75th

An authenticated privileged attacker could upload a specially crafted zip to the EspoCRM server in version 7.2.5, via the extension deployment form, which could lead to arbitrary PHP code execution.

CWE CWE-434
Vendor espocrm
Product espocrm
Published Nov 30, 2023
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for espocrm espocrm

Be the first to know when new medium vulnerabilities affecting espocrm espocrm are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

EspoCRM / EspoCRM
0 ≤ 7.5.2

References

NVD ↗ CVE.org ↗ EPSS Data ↗
incibe.es: https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-espocrm

Credits

Pedro José Navas Pérez