{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T13:43:16.024","vulnerabilities":[{"cve":{"id":"CVE-2024-49772","sourceIdentifier":"security-advisories@github.com","published":"2024-11-05T19:15:05.970","lastModified":"2024-11-13T20:19:54.597","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In SuiteCRM versions 7.14.4, poor input validation allows authenticated user do a SQL injection attack. Authenticated user with low pivilege can leak all data in database. This issue has been addressed in releases 7.14.6 and 8.7.1. Users are advised to upgrade. There are no known workarounds for this vulnerability."},{"lang":"es","value":"SuiteCRM es una aplicación de software de gestión de relaciones con los clientes (CRM) de código abierto y preparada para empresas. En las versiones 7.14.4 de SuiteCRM, una validación de entrada deficiente permite que un usuario autenticado realice un ataque de inyección SQL. Un usuario autenticado con poco nivel de privilegios puede filtrar todos los datos de la base de datos. Este problema se ha solucionado en las versiones 7.14.6 y 8.7.1. Se recomienda a los usuarios que actualicen la versión. No existen workarounds conocidos para esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*","versionEndExcluding":"7.14.6","matchCriteriaId":"CA0F70A0-D9EC-477C-B064-B3BF05F267C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*","versionStartIncluding":"8.0.0","versionEndExcluding":"8.7.1","matchCriteriaId":"8D8D3AE6-92A3-4A31-82D8-4B0EA8DF78CC"}]}]}],"references":[{"url":"https://github.com/salesagility/SuiteCRM/security/advisories/GHSA-4xj8-hr85-hm3m","source":"security-advisories@github.com","tags":["Third Party Advisory"]}]}}]}