Description
SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, an LDAP Injection vulnerability exists in the SuiteCRM authentication flow. The application fails to properly sanitize user-supplied input before embedding it into the LDAP search filter. By injecting LDAP control characters, an unauthenticated attacker can manipulate the query logic, which can lead to authentication bypass or information disclosure. Versions 7.15.1 and 8.9.3 patch the issue.
Published: 2026-03-19
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass and Information Disclosure
Action: Immediate Patch
AI Analysis

Impact

SuiteCRM suffers from an LDAP filter injection in the authentication module. The flaw arises because the application does not sanitize user‑supplied input before inserting it into the LDAP search filter, a weakness that maps to CWE‑90. By inserting LDAP control characters an attacker can alter the query logic, enabling them to bypass authentication or extract sensitive directory data. The result is privilege escalation through unauthenticated access or information disclosure to an attacker.

Affected Systems

All versions of SuiteCRM prior to 7.15.1 and 8.9.3 are affected. These include the open‑source SuiteCRM product, regardless of deployment platform, as the vulnerability exists in the core authentication flow. Versions 7.15.1 and 8.9.3, and later releases contain the official fix.

Risk and Exploitability

The vulnerability received a CVSS score of 8.8, indicating high severity, while the EPSS score is below 1 %, suggesting that public exploitation is unlikely at this time, and it is not listed in the CISA KEV catalog. Because the flaw can be triggered over the normal authentication endpoint, an unauthenticated attacker can reach the vulnerable code without needing any special credentials. If successfully exploited, the attacker gains the ability to bypass login entirely or read directory entries, posing a significant confidentiality and integrity risk to the CRM data.

Generated by OpenCVE AI on March 23, 2026 at 18:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update SuiteCRM to version 7.15.1 or newer on all installations.
  • If an upgrade cannot be performed immediately, limit LDAP access to trusted hosts and monitor logs for anomalous authentication attempts.

Generated by OpenCVE AI on March 23, 2026 at 18:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:suitecrm:suitecrm:*:*:*:*:*:*:*:*

Fri, 20 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 20 Mar 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Suitecrm
Suitecrm suitecrm
Vendors & Products Suitecrm
Suitecrm suitecrm

Thu, 19 Mar 2026 23:30:00 +0000

Type Values Removed Values Added
Description SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, an LDAP Injection vulnerability exists in the SuiteCRM authentication flow. The application fails to properly sanitize user-supplied input before embedding it into the LDAP search filter. By injecting LDAP control characters, an unauthenticated attacker can manipulate the query logic, which can lead to authentication bypass or information disclosure. Versions 7.15.1 and 8.9.3 patch the issue.
Title SuiterCRM has LDAP Filter Injection in Authentication Module
Weaknesses CWE-90
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Suitecrm Suitecrm
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-20T14:58:56.382Z

Reserved: 2026-03-18T18:55:47.426Z

Link: CVE-2026-33289

cve-icon Vulnrichment

Updated: 2026-03-20T14:58:53.173Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T00:16:18.647

Modified: 2026-03-23T16:57:46.870

Link: CVE-2026-33289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T11:54:03Z

Weaknesses