CVE-2024-50335

📊 4.9 MEDIUM0.4%🎯 1 exploits
📅 Published Nov 5, 2024
📋 Status: Analyzed

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. The "Publish Key" field in SuiteCRM's Edit Profile page is vulnerable to Reflected Cross-Site Scripting (XSS), allowing an attacker to inject malicious JavaScript code. This can be exploited to steal CSRF tokens and perform unauthorized actions, such as creating new administrative users without proper authentication. The vulnerability arises due to insufficient input validation and sanitization of the Publish Key field within the SuiteCRM application. When an attacker injects a malicious script, it gets executed within the context of an authenticated user's session. The injected script (o.js) then leverages the captured CSRF token to forge requests that create new administrative users, effectively compromising the integrity and security of the CRM instance. This issue has been addressed in versions 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.

🎯 Affected Products & Systems

2 product configurations affected

Filter by type:
📱
Application
Vulnerable
Version: < 7.14.6
CPE:
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
📱
Application
Vulnerable
Version: ≥ 8.0.0 ∧ < 8.7.1
CPE:
cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*
Metrics
4.9 MEDIUMCVSS v3.1[email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
Attack Vector:
NETWORK
Complexity:
LOW
Privileges:
HIGH
User Interaction:
NONE
Confidentiality:
HIGH
Integrity:
NONE
Availability:
NONE
Scope:
UNCHANGED

🔍 Technical Details

Analysis Status
Analyzed
CVSS Details
4.9 (MEDIUM)v3.1
EPSS Details
0.4% (Minimal)58.7th percentile
Last updated: Oct 31, 2025
Exploitation probability within 30 days
Published Date
Nov 5, 2024 (12 months ago)
Last Modified
Nov 8, 2024 (11 months ago)
Security Weaknesses1

Available exploits (1)

🔐 Sign-in Required

Sign in to view exploits and proof-of-concept code.

References2