Impact
EspoCRM contains an IDOR flaw in the POST /api/v1/Email/importEml endpoint that allows any authenticated user with Email:create and Import permissions to provide a fileId and read the contents of another user’s .eml attachment. The endpoint also deletes the original attachment record as part of the import flow, which violates the standard permission checks applied to attachment download. This results in confidential data exposure and accidental loss of attachment data for the victim.
Affected Systems
The vulnerability is present in EspoCRM versions 9.3.3 and earlier. Version 9.3.4 and later contain a fix that enforces proper access control on attachment retrieval.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity. Exploitation requires a legitimate Authenticated user who has the Email:create and Import permissions, which limits the attack surface to users with those rights. No EPSS score is available and the vulnerability is not listed in the CISA KEV catalog. However, attachment IDs are frequently exposed in normal UI and API workflows, making the IDOR practically exploitable for users who meet the permission criteria.
OpenCVE Enrichment