Description
An issue was discovered in EspoCRM before 5.6.9. Stored XSS was executed inside the title and breadcrumb of a newly formed entity available to all the users. A malicious user can inject JavaScript in these values of an entity, thus stealing user cookies when someone visits the publicly accessible link.
References (4)
Core 4
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/espocrm/espocrm/commit/ffd3f762ce4a8de3b8962f33513e073c55d943b5
Release Notes, Third Party Advisory x_refsource_misc
https://github.com/espocrm/espocrm/releases/tag/5.6.9
Third Party Advisory x_refsource_misc
https://github.com/espocrm/espocrm/issues/1369
Exploit, Third Party Advisory x_refsource_misc
https://gauravnarwani.com/publications/cve-2019-14549/
Scores
CVSS v3
5.4
EPSS
0.0036
EPSS Percentile
58.1%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (1)
espocrm/espocrm
< 5.6.9
Published
Aug 05, 2019
Tracked Since
Feb 18, 2026