Show plain JSON{"id": "CVE-2025-32789", "cveTags": [], "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "security-advisories@github.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.1, "attackVector": "NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 1.6}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 3.7, "attackVector": "NETWORK", "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "LOW"}, "impactScore": 1.4, "exploitabilityScore": 2.2}]}, "published": "2025-04-16T22:15:14.800", "references": [{"url": "https://github.com/espocrm/espocrm/commit/91740192d2e2c575c6a04534c079baf9f3af0a7f", "tags": ["Patch"], "source": "security-advisories@github.com"}, {"url": "https://github.com/espocrm/espocrm/commit/bd900d0b48fe37a98def4c0e094e39e7e385e9ea", "tags": ["Patch"], "source": "security-advisories@github.com"}, {"url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53", "tags": ["Exploit", "Vendor Advisory"], "source": "security-advisories@github.com"}, {"url": "https://github.com/espocrm/espocrm/security/advisories/GHSA-3ph3-jcfx-fq53", "tags": ["Exploit", "Vendor Advisory"], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"}], "vulnStatus": "Analyzed", "weaknesses": [{"type": "Secondary", "source": "security-advisories@github.com", "description": [{"lang": "en", "value": "CWE-200"}, {"lang": "en", "value": "CWE-203"}]}], "descriptions": [{"lang": "en", "value": "EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the sorted list of users. Although unlikely, if an attacker knows the hash value of their password, they can change the password and repeat the sorting until the other user's password hash is fully revealed. This issue is patched in version 9.0.7."}, {"lang": "es", "value": "EspoCRM es un software de gesti\u00f3n de relaciones con clientes de c\u00f3digo abierto. Antes de la versi\u00f3n 9.0.7, los usuarios pod\u00edan ordenarse por el hash de su contrase\u00f1a. Esta falla permite a un atacante suponer los valores hash de otros usuarios almacenados en la columna de contrase\u00f1as de la tabla de usuarios, bas\u00e1ndose en los resultados de la lista ordenada de usuarios. Aunque es improbable, si un atacante conoce el valor hash de su contrase\u00f1a, puede cambiarla y repetir la ordenaci\u00f3n hasta que se revele completamente el hash de la contrase\u00f1a del otro usuario. Este problema se solucion\u00f3 en la versi\u00f3n 9.0.7."}], "lastModified": "2025-06-18T13:08:03.067", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:espocrm:espocrm:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "13369107-8A5F-4141-986F-E7D8ED04FE3A", "versionEndExcluding": "9.0.7"}], "operator": "OR"}]}], "sourceIdentifier": "security-advisories@github.com"}