CVE-2026-33733 PUBLISHED

EspoCRM has Admin TemplateManager path traversal that allows arbitrary file read write and delete

Assigner: GitHub_M
Reserved: 23.03.2026 Published: 22.04.2026 Updated: 22.04.2026

EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controlled name and scope values and pass them into template path construction without normalization or traversal filtering. As a result, an authenticated admin can use ../ sequences to escape the intended template directory and read, create, overwrite, or delete arbitrary files that resolve to body.tpl or subject.tpl under the web application user's filesystem permissions. Version 9.3.4 fixes the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor espocrm
Product espocrm
Versions
  • Version < 9.3.4 is affected

References

Problem Types

  • CWE-23: Relative Path Traversal CWE