Description
EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controlled `name` and `scope` values and pass them into template path construction without normalization or traversal filtering. As a result, an authenticated admin can use `../` sequences to escape the intended template directory and read, create, overwrite, or delete arbitrary files that resolve to `body.tpl` or `subject.tpl` under the web application user's filesystem permissions. Version 9.3.4 fixes the issue.
Published: 2026-04-22
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Arbitrary file read/write/delete via path traversal
Action: Immediate Patch
AI Analysis

Impact

EspoCRM's TemplateManager accepts attacker-controlled name and scope parameters without normalizing paths, enabling an authenticated administrator to use '../' sequences to escape the intended template directory. This allows the admin to read, create, overwrite, or delete arbitrary files that resolve to body.tpl or subject.tpl within the web application's user filesystem. The flaw can be exploited to access sensitive configuration files, modify application logic, or delete critical data, potentially leading to further compromise of the system.

Affected Systems

All EspoCRM installations running a version earlier than 9.3.4 are vulnerable. The issue is confined to environments where the application runs under a user identity that has write permissions to the directories where body.tpl and subject.tpl reside, typically the web server's user account. Only users with administrative privileges to the TemplateManager interface are able to exploit the error.

Risk and Exploitability

The CVSS score of 7.2 indicates a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, suggesting no known widespread exploitation yet. The attack requires an authenticated admin session, so exploitation is limited to accounts with TemplateManager access, but the impact of modifying or deleting configuration or template files can lead to data loss or further privilege escalation. Regular users without admin rights cannot exploit the flaw, but may be affected by data loss caused by an admin attacker.

Generated by OpenCVE AI on April 27, 2026 at 08:26 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to EspoCRM 9.3.4 or later to remove the vulnerability.
  • Limit TemplateManager access by reducing the number of administrator accounts or disabling the feature for roles that do not require it.
  • Modify file system permissions so that the web application user cannot write outside the intended template directory, adding an additional layer of defense.

Generated by OpenCVE AI on April 27, 2026 at 08:26 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 27 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*

Thu, 23 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 22 Apr 2026 22:30:00 +0000

Type Values Removed Values Added
First Time appeared Espocrm
Espocrm espocrm
Vendors & Products Espocrm
Espocrm espocrm

Wed, 22 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
Description EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controlled `name` and `scope` values and pass them into template path construction without normalization or traversal filtering. As a result, an authenticated admin can use `../` sequences to escape the intended template directory and read, create, overwrite, or delete arbitrary files that resolve to `body.tpl` or `subject.tpl` under the web application user's filesystem permissions. Version 9.3.4 fixes the issue.
Title EspoCRM has Admin TemplateManager path traversal that allows arbitrary file read write and delete
Weaknesses CWE-23
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-04-23T16:25:04.022Z

Reserved: 2026-03-23T17:34:57.560Z

Link: CVE-2026-33733

cve-icon Vulnrichment

Updated: 2026-04-23T13:36:24.999Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-22T21:17:05.970

Modified: 2026-04-27T15:08:59.447

Link: CVE-2026-33733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-27T18:42:00Z

Weaknesses