LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-33656

CVE-2026-33656 - Vulnerability Analysis

CriticalCVSS: 9.1

Last Updated: April 22, 2026

EspoCRM - Path Traversal

Published: April 22, 2026Updated: April 22, 2026PoC AvailableRemote Exploitable

Overview

EspoCRM < 9.3.4 contains a path traversal caused by unsanitized update of attachment's sourceId in formula scripting engine, letting authenticated admin redirect file operations within open_basedir scope.

Severity & Score

Severity: Critical
CVSS Score: 9.1
EPSS Score: 0.0%(Probability of exploitation in next 30 days)

Impact

Authenticated admins can overwrite file paths, enabling arbitrary file read/write within web server's restricted directories.

Mitigation

Upgrade to version 9.3.4 or later.

Social Media Activity(1 post)

/r/netsec
/r/netsec
@_r_netsec
Mar 25, 2026

CVE-2026-33656: EspoCRM ≤ 9.3.3 — Formula engine ACL gap + path traversal → authenticated RCE (full write-up + PoC) https://jivasecurity.com/writeups/espocrm-rce-cve-2026-33656

View original post

Details

CVE ID
CVE-2026-33656
Severity
Critical
CVSS Score
9.1
Type
path_traversal
Status
unconfirmed
EPSS
0.0%
Social Posts
1

CWE

  • CWE-22

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

EPSS Score

0.0%Probability of exploitation in the next 30 days