Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions up to and including 8.9.2 contain an unsafe deserialization vulnerability in the SavedSearch filter processing component that allows an authenticated administrator to execute arbitrary system commands on the server. `FilterDefinitionProvider.php` calls `unserialize()` on user-controlled data from the `saved_search.contents` database column without restricting instantiable classes. Version 8.9.3 patches the issue.
Published: 2026-03-19
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote code execution via unsafe deserialization
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from the SavedSearch filter processing in SuiteCRM. The core component unserializes user-controlled data from the database column "saved_search.contents" without limiting the classes that can be instantiated. This flaw allows an authenticated administrator to execute arbitrary system commands on the host running the application, compromising both confidentiality and integrity of the server and surrounding network environment. The weakness is classified under CWE‑502.

Affected Systems

SuiteCRM Core versions 8.9.2 and earlier are affected. The patch that resolves the issue is included in version 8.9.3. Users must verify the exact version of their deployment against the affected range and apply the update if they are running a vulnerable release.

Risk and Exploitability

The common vulnerability scoring system assigns a score of 8.6, indicating a high impact if exploited. The estimated probability of exploitation is very low, with an EPSS score below 1 %. The vulnerability is not listed in CISA’s Known Exploit Vulnerabilities catalog. Based on the description, the likely attack vector is an authenticated administrator who can upload or manipulate saved search data; the attacker must have administrative privileges to execute commands, making the attack more limited to insiders but still dangerous due to the full system impact.

Generated by OpenCVE AI on March 23, 2026 at 18:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SuiteCRM to version 8.9.3 or later.

Generated by OpenCVE AI on March 23, 2026 at 18:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 20 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions up to and including 8.9.2 contain an unsafe deserialization vulnerability in the SavedSearch filter processing component that allows an authenticated administrator to execute arbitrary system commands on the server. `FilterDefinitionProvider.php` calls `unserialize()` on user-controlled data from the `saved_search.contents` database column without restricting instantiable classes. Version 8.9.3 patches the issue.
Title SuiteCRM Authenticated Remote Code Execution via Unsafe Deserialization in SavedSearch Filter Processing
Weaknesses CWE-502
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T18:09:12.156Z

Reserved: 2026-03-03T21:54:06.709Z

Link: CVE-2026-29109

cve-icon Vulnrichment

Updated: 2026-03-20T16:57:12.530Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T00:16:16.147

Modified: 2026-03-23T16:48:58.803

Link: CVE-2026-29109

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:01Z

Weaknesses