CVE-2019-25664

HIGH

SuiteCRM 7.10.7 SQL Injection via record Parameter

Title source: cna
STIX 2.1

Description

SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques.

Exploits (1)

exploitdb WORKING POC
by Mehmet EMIROGLU · textwebappsphp
https://www.exploit-db.com/exploits/46311

References (4)

Core 4
Core References
Exploit exploit
ExploitDB-46311
https://www.exploit-db.com/exploits/46311
Product product
Official Product Homepage
https://suitecrm.com/
Product product
Product Reference
https://suitecrm.com/download/
Third Party Advisory third-party-advisory
VulnCheck Advisory: SuiteCRM 7.10.7 SQL Injection via record Parameter
https://www.vulncheck.com/advisories/suitecrm-sql-injection-via-record-parameter

Scores

CVSS v3 7.1
EPSS 0.0005
EPSS Percentile 15.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-89
Status published
Products (2)
salesagility/suitecrm < 7.10.7
Suitecrm/SuiteCRM 7.10.7
Published Apr 05, 2026
Tracked Since Apr 06, 2026