Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 8.9.3, an authenticated API endpoint allows any user to retrieve detailed information about any other user, including their password hash, username, and MFA configuration. As any authenticated user can query this endpoint, it's possible to retrieve and potentially crack the passwords of administrative users. Version 8.9.3 patches the issue.
Published: 2026-03-19
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access to user password hashes
Action: Apply Patch
AI Analysis

Impact

A suiteCRM API endpoint that accepts authenticated requests mistakenly returns comprehensive user data, including password hashes, usernames, and MFA settings. This flaw constitutes an information disclosure weakness (CWE‑200) and permits an attacker who has valid login credentials to harvest password hashes for any user, including administrative accounts. If an attacker replays a hashed value or conducts offline cracking, they can potentially obtain plaintext passwords and elevate privileges within the system.

Affected Systems

All instances of suiteCRM Core running versions earlier than 8.9.3 are affected. The vulnerability originates from the default API response configuration and does not require any additional configuration changes. Updating to 8.9.3 or later eliminates the exposed endpoint and restores proper access controls.

Risk and Exploitability

The CVSS base score of 6.5 reflects a medium severity vulnerability, and the EPSS probability of exploitation is under 1 %, indicating that attacks are currently uncommon. Because the flaw relies on an authenticated session, an adversary needs only valid user credentials or social‑engineering access to the application. Once authenticated, the attacker can query the vulnerable endpoint over any network channel that permits API traffic. The vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation to date.

Generated by OpenCVE AI on March 23, 2026 at 18:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade suiteCRM to version 8.9.3 or later to patch the vulnerable API endpoint
  • If an immediate upgrade is not possible, restrict API access to privileged roles and audit user permissions regularly
  • Verify that backup and monitoring solutions are in place to detect unauthorized activity or anomalous API usage

Generated by OpenCVE AI on March 23, 2026 at 18:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 8.9.3, an authenticated API endpoint allows any user to retrieve detailed information about any other user, including their password hash, username, and MFA configuration. As any authenticated user can query this endpoint, it's possible to retrieve and potentially crack the passwords of administrative users. Version 8.9.3 patches the issue.
Title Authenticated SuiteCRM Users Can Retrieve The Password Hash of Any User
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-21T03:06:59.568Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29108

cve-icon Vulnrichment

Updated: 2026-03-21T03:06:54.589Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T00:16:15.983

Modified: 2026-03-23T16:49:25.540

Link: CVE-2026-29108

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:02Z

Weaknesses