Impact
EspoCRM versions 9.3.3 and older allow an authenticated user to exploit a Server‑Side Request Forgery by supplying IPv4 addresses in alternative octal notation that bypasses the internal‑host validation logic. The flaw relies on PHP’s filter_var function, which does not recognize alternative IP formats, resulting in the server resolving the address to the loopback host and storing the fetched content as an attachment. This weakness, classified as CWE‑918, enables access to services reachable only from the application’s runtime environment.
Affected Systems
The affected product is EspoCRM, versions 9.3.3 and earlier. The vulnerability is fixed in version 9.3.4. Any installation running a vulnerable release is susceptible until it is upgraded.
Risk and Exploitability
The CVSS score of 4.3 indicates moderate severity, and the vulnerability requires valid authentication to trigger the /api/v1/Attachment/fromImageUrl endpoint, limiting the attack surface. EPSS data are not available, and the issue is not listed in CISA’s KEV catalog. An attacker can log into the application, supply a crafted URL using an obfuscated IP address, and force the server to contact internal services over the loopback interface, potentially exposing sensitive data.
OpenCVE Enrichment