Cyber Posture

CVE-2026-29189

High

Published: 20 March 2026

Published
20 March 2026
Modified
23 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0001 2.8th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-29189 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Suitecrm Suitecrm. Its CVSS base score is 8.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 2.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the CVE's core issue of missing ACL checks by requiring enforcement of approved authorizations for logical access to information and system resources in API endpoints.

prevent

Mitigates the authorization bypass flaw through timely identification, reporting, and correction of the software vulnerability, as fixed in SuiteCRM versions 7.15.1 and 8.9.3.

prevent

Limits the impact of unauthorized data access and manipulation by ensuring low-privileged authenticated users only have access necessary for their assigned tasks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.004 Customer Relationship Management Software Collection
Adversaries may leverage Customer Relationship Management (CRM) software to mine valuable information.
T1565.001 Stored Data Manipulation Impact
Adversaries may insert, delete, or manipulate data at rest in order to influence external outcomes or hide activity, thus threatening the integrity of the data.
Why these techniques?

Authorization bypass in public-facing SuiteCRM REST API directly enables exploitation of the web app (T1190), unauthorized collection from CRM data repositories (T1213.004), and stored data tampering (T1565.001).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the SuiteCRM REST API V8 has missing ACL (Access Control List) checks on several endpoints, allowing authenticated users to access and manipulate data…

more

they should not have permission to interact with. Versions 7.15.1 and 8.9.3 patch the issue.

Deeper analysisAI

CVE-2026-29189 affects SuiteCRM, an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions prior to 7.15.1 and 8.9.3, the SuiteCRM REST API V8 lacks Access Control List (ACL) checks on several endpoints. This authorization bypass vulnerability, classified as CWE-639, enables authenticated users to access and manipulate data beyond their permitted scope. It carries a CVSS v3.1 base score of 8.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N).

A low-privileged authenticated user can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting requests to the affected API endpoints, the attacker gains unauthorized read and write access to sensitive CRM data, such as customer records or other restricted information, potentially leading to significant data exposure and tampering.

SuiteCRM versions 7.15.1 and 8.9.3 address the issue with patches that restore proper ACL enforcement. Security practitioners are advised to upgrade immediately. Further details on the fix and release notes are provided in the official documentation at https://docs.suitecrm.com/admin/releases/7.15.x and the GitHub security advisory at https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-m6x8-3hxp-qxwv.

Details

CWE(s)

Affected Products

suitecrm
suitecrm
≤ 7.15.1 · 8.0.0 — 8.9.3

CVEs Like This One

CVE-2026-29102Same product: Suitecrm Suitecrm
CVE-2026-33289Same product: Suitecrm Suitecrm
CVE-2026-29109Same product: Suitecrm Suitecrm
CVE-2026-29103Same product: Suitecrm Suitecrm
CVE-2026-29097Same product: Suitecrm Suitecrm
CVE-2026-29100Same product: Suitecrm Suitecrm
CVE-2026-29096Same product: Suitecrm Suitecrm
CVE-2026-29099Same product: Suitecrm Suitecrm
CVE-2026-33288Same product: Suitecrm Suitecrm
CVE-2026-29101Same product: Suitecrm Suitecrm

References