Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute arbitrary system commands. This vulnerability is a direct Patch Bypass of CVE-2024-49774. Although the vendor attempted to fix the issue in version 7.14.5, the underlying flaw in ModuleScanner.php regarding PHP token parsing remains. The scanner incorrectly resets its internal state ($checkFunction flag) when encountering any single-character token (such as =, ., or ;). This allows attackers to hide dangerous function calls (e.g., system(), exec()) using variable assignments or string concatenation, completely evading the MLP security controls. Versions 7.15.1 and 8.9.3 patch the issue.
Published: 2026-03-19
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

SuiteCRM suffers from a critical remote code execution vulnerability in its ModuleScanner.php component, specifically in the PHP token parsing logic. The flaw mismanages the internal $checkFunction flag when encountering single‑character tokens, allowing attackers to conceal calls to dangerous functions such as system() or exec() behind variable assignments or string concatenation. Because the vulnerability can be exploited by authenticated administrators, anyone with admin privileges can run arbitrary system commands, compromising the confidentiality, integrity, and availability of the entire system. The weakness maps to CWE‑358 (PHP token parsing error) and CWE‑94 (code injection).

Affected Systems

Affected products are SuiteCRM 7.15.0 and 8.9.2. The issue was introduced when the vendor attempted to patch CVE‑2024‑49774 in version 7.14.5, but the underlying flaw persisted. Versions 7.15.1 and 8.9.3 contain the fix. Therefore, any installation running 7.15.0 or 8.9.2 remains vulnerable. Other SuiteCRM releases are not listed as affected.

Risk and Exploitability

The CVSS score of 9.1 indicates a high severity of remote code execution. An EPSS score under 1% suggests that the probability of exploitation is very low currently, and the vulnerability is not listed in the CISA KEV catalog. However, exploitation still requires an authenticated administrator, which is a plausible privilege for many organisations. The attack proceeds by bypassing the ModuleLoader Package Scanner security checks, enabling an attacker to embed malicious function calls that evade detection. If exploited, the attacker could gain full control over the web server and potentially the underlying operating system.

Generated by OpenCVE AI on March 24, 2026 at 15:27 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest SuiteCRM patch (v7.15.1 or v8.9.3) immediately
  • Verify the patch application and confirm removal of vulnerable code
  • If patch cannot be applied, restrict or disable administrator accounts that use ModuleLoader until a patch is available
  • Monitor logs for suspicious ModuleScanner activity and maintain audit trails

Generated by OpenCVE AI on March 24, 2026 at 15:27 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:00:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. A Critical Remote Code Execution (RCE) vulnerability exists in SuiteCRM 7.15.0 and 8.9.2, allowing authenticated administrators to execute arbitrary system commands. This vulnerability is a direct Patch Bypass of CVE-2024-49774. Although the vendor attempted to fix the issue in version 7.14.5, the underlying flaw in ModuleScanner.php regarding PHP token parsing remains. The scanner incorrectly resets its internal state ($checkFunction flag) when encountering any single-character token (such as =, ., or ;). This allows attackers to hide dangerous function calls (e.g., system(), exec()) using variable assignments or string concatenation, completely evading the MLP security controls. Versions 7.15.1 and 8.9.3 patch the issue.
Title SuiteCRM Vulnerable to Remote Code Execution via Module Loader Package Scanner Bypass
Weaknesses CWE-358
CWE-94
References
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T20:07:56.895Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29103

cve-icon Vulnrichment

Updated: 2026-03-20T20:07:53.763Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T23:16:42.970

Modified: 2026-03-24T14:23:34.037

Link: CVE-2026-29103

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:12Z

Weaknesses