CVE-2022-50589
Published: 06 November 2025
Summary
CVE-2022-50589 is a critical-severity SQL Injection (CWE-89) vulnerability in Salesagility Suitecrm. Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 38.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates SQL injection by requiring validation of untrusted inputs like the 'uid' parameter in the export functionality.
Ensures timely patching or upgrading of SuiteCRM to version 7.12.6 or later to remediate the specific SQL injection flaw.
Regular vulnerability scanning identifies SQL injection vulnerabilities such as CVE-2022-50589 in the export endpoint.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
SQL injection in public-facing SuiteCRM (CRM software) enables unauthenticated exploitation of public-facing application (T1190) and arbitrary database queries for data collection from CRM software (T1213.004) and databases (T1213.006).
NVD Description
SuiteCRM versions prior to 7.12.6 contain a SQL injection vulnerability within the processing of the ‘uid’ parameter within the ‘export’ functionality. Successful exploitation allows remote unauthenticated attackers to ultimately execute arbitrary code.
Deeper analysisAI
CVE-2022-50589 is a SQL injection vulnerability (CWE-89) affecting SuiteCRM versions prior to 7.12.6, specifically within the processing of the 'uid' parameter in the 'export' functionality. Rated at CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it enables attackers to manipulate database queries through unsanitized input.
Remote unauthenticated attackers can exploit this vulnerability by sending crafted requests to the export endpoint, potentially extracting sensitive data or escalating to arbitrary code execution on the server.
Advisories recommend upgrading to SuiteCRM 7.12.6 or later, as detailed in the official release notes, to mitigate the issue by addressing the insecure parameter handling.
Details
- CWE(s)