Cyber Posture

CVE-2022-50589

CriticalPublic PoC

Published: 06 November 2025

Published
06 November 2025
Modified
24 November 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 38.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2022-50589 is a critical-severity SQL Injection (CWE-89) vulnerability in Salesagility Suitecrm. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates SQL injection by requiring validation of untrusted inputs like the 'uid' parameter in the export functionality.

prevent

Ensures timely patching or upgrading of SuiteCRM to version 7.12.6 or later to remediate the specific SQL injection flaw.

preventdetect

Regular vulnerability scanning identifies SQL injection vulnerabilities such as CVE-2022-50589 in the export endpoint.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.004 Customer Relationship Management Software Collection
Adversaries may leverage Customer Relationship Management (CRM) software to mine valuable information.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in public-facing SuiteCRM (CRM software) enables unauthenticated exploitation of public-facing application (T1190) and arbitrary database queries for data collection from CRM software (T1213.004) and databases (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

SuiteCRM versions prior to 7.12.6 contain a SQL injection vulnerability within the processing of the ‘uid’ parameter within the ‘export’ functionality. Successful exploitation allows remote unauthenticated attackers to ultimately execute arbitrary code.

Deeper analysisAI

CVE-2022-50589 is a SQL injection vulnerability (CWE-89) affecting SuiteCRM versions prior to 7.12.6, specifically within the processing of the 'uid' parameter in the 'export' functionality. Rated at CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it enables attackers to manipulate database queries through unsanitized input.

Remote unauthenticated attackers can exploit this vulnerability by sending crafted requests to the export endpoint, potentially extracting sensitive data or escalating to arbitrary code execution on the server.

Advisories recommend upgrading to SuiteCRM 7.12.6 or later, as detailed in the official release notes, to mitigate the issue by addressing the insecure parameter handling.

Details

CWE(s)

Affected Products

salesagility
suitecrm
≤ 7.12.6

CVEs Like This One

CVE-2025-54788Same product: Salesagility Suitecrm
CVE-2019-25663Same product: Salesagility Suitecrm
CVE-2019-25664Same product: Salesagility Suitecrm
CVE-2025-54785Same product: Salesagility Suitecrm
CVE-2022-45186Same product: Salesagility Suitecrm
CVE-2022-45185Same product: Salesagility Suitecrm
CVE-2026-23492Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2025-25116Shared CWE-89
CVE-2025-52025Shared CWE-89

References