Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the value of the return_id request parameter is copied into the value of an HTML tag attribute which is an event handler and is encapsulated in double quotation marks. Versions 7.15.1 and 8.9.3 patch the issue. Users should also use a Content Security Policy (CSP) header to completely mitigate XSS.
Published: 2026-03-19
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Blind Cross‑Site Scripting via return_id parameter
Action: Patch
AI Analysis

Impact

The vulnerability allows an attacker to inject arbitrary JavaScript by sending a specially crafted return_id query value. Because the value is directly placed into an HTML attribute that is an event handler and wrapped in double quotes, the script runs when the resulting page is rendered in the victim’s browser. This blind XSS does not produce immediate visual feedback for the attacker but can execute code in the context of the target site. Based on the typical consequences of XSS, the attacker could potentially steal session data, modify page content, or perform other client‑side actions; however, the CVE description does not confirm any of these specific outcomes, so they remain inferred risks.

Affected Systems

SuiteCRM installations running any release earlier than 7.15.1 in the 7.x series or earlier than 8.9.3 in the 8.x series are vulnerable. Versions 7.15.1 and 8.9.3 contain the fix that removes the unsafe echoing of return_id into the attribute.

Risk and Exploitability

The CVSS score of 5.9 indicates moderate severity, and the EPSS score of less than 1 percent suggests a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog, reinforcing its perceived risk level. Exploitation requires an attacker to craft a request that includes a malicious return_id value and an end‑user to load the resulting page in a browser. Because the injection occurs in an event‑handler attribute, the attacker must entice a user to visit the page or embed it in an iframe or link; passive exploitation (e.g., via DNS) is not feasible. The impact is confined to the victim’s session and does not grant direct control over the server.

Generated by OpenCVE AI on March 24, 2026 at 15:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official SuiteCRM patch by upgrading to version 7.15.1 or newer (or 8.9.3 or newer).
  • If an upgrade is not immediately possible, enforce a strict Content Security Policy that disallows inline scripts to mitigate the XSS risk.
  • If neither patch nor CSP is feasible, implement server‑side encoding or validation of the return_id parameter to neutralize the injection.

Generated by OpenCVE AI on March 24, 2026 at 15:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the value of the return_id request parameter is copied into the value of an HTML tag attribute which is an event handler and is encapsulated in double quotation marks. Versions 7.15.1 and 8.9.3 patch the issue. Users should also use a Content Security Policy (CSP) header to completely mitigate XSS.
Title SuiteCRM has blind XSS in return_id parameter
Weaknesses CWE-116
CWE-159
CWE-79
CWE-80
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T14:59:59.888Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29106

cve-icon Vulnrichment

Updated: 2026-03-20T14:59:56.225Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T23:16:43.500

Modified: 2026-03-24T13:58:40.143

Link: CVE-2026-29106

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:08Z