CVE-2026-33733
Published: 22 April 2026
Summary
CVE-2026-33733 is a high-severity Relative Path Traversal (CWE-23) vulnerability in Espocrm Espocrm. Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 28.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly requires validation and sanitization of attacker-controlled 'name' and 'scope' parameters to prevent path traversal sequences like '../' in template path construction.
Mandates timely identification, reporting, and remediation of the path traversal flaw, such as patching to EspoCRM version 9.3.4.
Enforces least privilege on the web application user's filesystem permissions, limiting the scope and impact of arbitrary file read/create/overwrite/delete operations via traversal.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing web app (T1190) directly enables reading arbitrary files (T1005), stored data manipulation via overwrite (T1565.001), and file deletion (T1070.004) by authenticated admins.
NVD Description
EspoCRM is an open source customer relationship management application. Prior to version 9.3.4, the admin template management endpoints accept attacker-controlled `name` and `scope` values and pass them into template path construction without normalization or traversal filtering. As a result, an…
more
authenticated admin can use `../` sequences to escape the intended template directory and read, create, overwrite, or delete arbitrary files that resolve to `body.tpl` or `subject.tpl` under the web application user's filesystem permissions. Version 9.3.4 fixes the issue.
Deeper analysisAI
CVE-2026-33733 is a path traversal vulnerability (CWE-23) affecting EspoCRM, an open source customer relationship management application, in versions prior to 9.3.4. The issue resides in the admin template management endpoints, which accept attacker-controlled `name` and `scope` values without normalization or traversal filtering before using them in template path construction. This allows traversal sequences like `../` to escape the intended template directory. The vulnerability has a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H).
An authenticated administrator can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By crafting malicious `name` and `scope` parameters, the attacker can read, create, overwrite, or delete arbitrary files on the server, provided they resolve to `body.tpl` or `subject.tpl` and are accessible under the web application user's filesystem permissions. This enables full confidentiality, integrity, and availability compromise within those bounds.
The GitHub Security Advisory (GHSA-44c3-xjfp-3jrh) confirms that EspoCRM version 9.3.4 addresses the issue by fixing the template path handling in the affected endpoints. Security practitioners should upgrade to this version or later to mitigate the vulnerability.
Details
- CWE(s)