Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, it is possible to create PDF templates with `<img>` tags. When a PDF is exported using this template, the content (for example, `<img src=http://{burp_collaborator_url}>` is rendered server side, and thus a request is issued from the server, resulting in Server-Side Request Forgery. Versions 7.15.1 and 8.9.3 patch the issue.
Published: 2026-03-19
Score: 5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery via PDF export
Action: Apply Patch
AI Analysis

Impact

SuiteCRM allows an authenticated attacker to create or export PDF templates that contain arbitrary <img> tags. When the server renders these PDFs, it fetches the image sources from the specified URLs, enabling the attacker to force the server to make requests to internal or external addresses. This Server‑Side Request Forgery can disclose sensitive information, interact with internal services, or serve as a pivot for further attacks. The weakness is classified as CWE‑918, and its impact can compromise confidentiality, integrity, or availability of data accessed by the exploited web server.

Affected Systems

The vulnerability affects SuiteCRM versions prior to 7.15.1 and 8.9.3. Specifically, any deployment running SuiteCRM 7.15.0 or earlier, or 8.9.2 or earlier, is susceptible. Versions 7.15.1 and above, as well as 8.9.3 and above, contain the patch that disables the vulnerable behavior.

Risk and Exploitability

The CVSS score of 5 indicates a medium severity. The EPSS score is below 1 %, suggesting the exploitation rate is currently low, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need valid user credentials and the ability to create or export PDFs, making the attack vector authenticated. Nonetheless, the potential for internal network access makes it a risk that should not be ignored.

Generated by OpenCVE AI on March 24, 2026 at 15:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SuiteCRM to version 7.15.1 or 8.9.3 or later to apply the vendor patch.
  • If an upgrade is not immediately possible, restrict or disable the creation and export of PDF templates containing <img> tags so the server no longer fetches external URLs.

Generated by OpenCVE AI on March 24, 2026 at 15:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 24 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:15:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, it is possible to create PDF templates with `<img>` tags. When a PDF is exported using this template, the content (for example, `<img src=http://{burp_collaborator_url}>` is rendered server side, and thus a request is issued from the server, resulting in Server-Side Request Forgery. Versions 7.15.1 and 8.9.3 patch the issue.
Title SuiteCRM vulnerable to authenticated SSRF via PDF export
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T20:07:22.390Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29107

cve-icon Vulnrichment

Updated: 2026-03-20T20:07:18.282Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-19T23:16:43.680

Modified: 2026-03-24T13:46:52.977

Link: CVE-2026-29107

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:06Z

Weaknesses