Impact
The vulnerability stems from the retrieve() function in SuiteCRM’s OutboundEmail module not correctly sanitizing the $id parameter. An authenticated user can trigger this function via the EmailUIAjax action on the Email module, enabling blind SQL injection. This flaw permits extraction of arbitrary data from the database, including sensitive user credentials and password hashes, and is classified under CWE-89.
Affected Systems
SuiteCRM versions prior to 7.15.1 and 8.9.3 are affected. Specifically, the 7.15.x and 8.9.x major releases contain the vulnerable retrieve() implementation. Users running these versions should verify their build and update to the patched releases.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. EPSS is below 1%, suggesting a low probability of immediate exploitation, and the vulnerability is not listed in the CISA KEV catalog. Although the attack requires an authenticated session and involves a blind SQL injection path through EmailUIAjax, the lack of restrictions on database tables means an attacker could read a wide range of data. The combination of high impact and high severity makes it a priority to remediate.
OpenCVE Enrichment