Cyber Posture

CVE-2026-29100

High

Published: 19 March 2026

Published
19 March 2026
Modified
24 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N
EPSS Score 0.0004 11.2th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29100 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Suitecrm Suitecrm. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 11.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely flaw remediation, directly addressing this CVE by applying the SuiteCRM 7.15.1 patch that fixes the reflected HTML injection in the login page.

prevent

SI-10 enforces input validation on the login page, preventing attackers from injecting arbitrary HTML content via crafted URLs.

prevent

SI-15 mandates output filtering for the login page, blocking reflected malicious HTML to mitigate phishing and defacement attacks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1566.002 Spearphishing Link Initial Access
Adversaries may send spearphishing emails with a malicious link in an attempt to gain access to victim systems.
T1491.002 External Defacement Impact
An adversary may deface systems external to an organization in an attempt to deliver messaging, intimidate, or otherwise mislead an organization or users.
Why these techniques?

Reflected HTML injection in public-facing login page directly enables T1190 exploitation; crafted malicious URLs facilitate spearphishing links (T1566.002) for credential harvesting via fake forms; explicit support for page defacement maps to external defacement (T1491.002).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. SuiteCRM 7.15.0 contains a reflected HTML injection vulnerability in the login page that allows attackers to inject arbitrary HTML content, enabling phishing attacks and page defacement. Version 7.15.1 patches…

more

the issue.

Deeper analysisAI

CVE-2026-29100 is a reflected HTML injection vulnerability (CWE-79) affecting SuiteCRM version 7.15.0, an open-source enterprise Customer Relationship Management (CRM) software application. The flaw resides in the login page, where attackers can inject arbitrary HTML content. It carries a CVSS v3.1 base score of 7.1 (AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N), indicating high confidentiality impact with low integrity impact and no availability impact. The vulnerability was published on 2026-03-19.

Attackers can exploit this vulnerability remotely over the network with low complexity and no required privileges, but it necessitates user interaction. By tricking users—such as authenticated or prospective SuiteCRM users—into visiting a crafted URL pointing to the login page, attackers can inject malicious HTML. This enables phishing attacks, such as displaying fake login forms to steal credentials, or page defacement to spread misinformation or malware.

The SuiteCRM GitHub security advisory (GHSA-g7hf-3j93-rwm5) confirms that version 7.15.1 addresses the issue with a patch. Security practitioners should upgrade to SuiteCRM 7.15.1 or later and review login page inputs for sanitization as an interim measure.

Details

CWE(s)

Affected Products

suitecrm
suitecrm
≤ 7.15.1

CVEs Like This One

CVE-2026-29102Same product: Suitecrm Suitecrm
CVE-2026-33289Same product: Suitecrm Suitecrm
CVE-2026-29109Same product: Suitecrm Suitecrm
CVE-2026-29103Same product: Suitecrm Suitecrm
CVE-2026-29097Same product: Suitecrm Suitecrm
CVE-2026-29096Same product: Suitecrm Suitecrm
CVE-2026-29189Same product: Suitecrm Suitecrm
CVE-2026-33288Same product: Suitecrm Suitecrm
CVE-2026-29101Same product: Suitecrm Suitecrm
CVE-2026-29099Same product: Suitecrm Suitecrm

References