{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-10T11:06:16.654","vulnerabilities":[{"cve":{"id":"CVE-2021-25960","sourceIdentifier":"vulnerabilitylab@mend.io","published":"2021-09-29T14:15:07.953","lastModified":"2024-11-21T05:55:40.773","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In “SuiteCRM” application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by “CSV Injection” vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure."},{"lang":"es","value":"En la aplicación \"SuiteCRM\", versiones v7.11.18 hasta v7.11.19 y versiones v7.10.29 hasta v7.10.31, están afectadas por una vulnerabilidad \"CSV Injection\" (inyección de fórmulas). Un atacante con pocos privilegios puede usar el módulo de cuentas para inyectar cargas útiles en los campos input. Cuando un administrador accede al módulo de cuentas para exportar los datos como un archivo CSV y lo abre, la carga útil es ejecutada. Esto no fue corregido apropiadamente como parte de CVE-2020-15301, permitiendo al atacante omitir la medida de seguridad"}],"metrics":{"cvssMetricV31":[{"source":"vulnerabilitylab@mend.io","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.1,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","baseScore":6.0,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"vulnerabilitylab@mend.io","type":"Secondary","description":[{"lang":"en","value":"CWE-1236"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-1236"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*","versionStartIncluding":"7.10.29","versionEndExcluding":"7.10.32","matchCriteriaId":"910E9A39-F080-4FE2-BF0A-2EBF4B9ACF0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*","versionStartIncluding":"7.11.18","versionEndExcluding":"7.11.21","matchCriteriaId":"FBC8B9D4-BC3A-46ED-9A94-F3E45C4D0591"}]}]}],"references":[{"url":"https://github.com/salesagility/SuiteCRM/commit/7124482fe07ee164923d974456ed31e45f65e513","source":"vulnerabilitylab@mend.io","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/salesagility/SuiteCRM/commit/f463031bee59676d7d5be53bb32d551cd70a5648","source":"vulnerabilitylab@mend.io","tags":["Patch","Third Party Advisory"]},{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960","source":"vulnerabilitylab@mend.io","tags":["Third Party Advisory"]},{"url":"https://github.com/salesagility/SuiteCRM/commit/7124482fe07ee164923d974456ed31e45f65e513","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://github.com/salesagility/SuiteCRM/commit/f463031bee59676d7d5be53bb32d551cd70a5648","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory"]},{"url":"https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25960","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}