Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

758+ Articles
120+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-33656: EspoCRM Formula Engine Attachment sourceId Overwrite (CVSS 9.1)
CVE-2026-33656: EspoCRM Formula Engine Attachment sourceId Overwrite (CVSS 9.1)

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-33656

CVE-2026-33656: EspoCRM Formula Engine Attachment sourceId Overwrite (CVSS 9.1)

A critical improper access control vulnerability in EspoCRM's built-in formula scripting engine allows authenticated administrators to overwrite the sourceId field on Attachment entities, enabling unauthorized data manipulation before version 9.3.4.

Dylan H.

Security Team

April 23, 2026
3 min read

Affected Products

  • EspoCRM < 9.3.4

Overview

CVE-2026-33656 is a critical-severity (CVSS 9.1) improper access control vulnerability in EspoCRM, a widely deployed open-source customer relationship management application. Published on April 22, 2026, the flaw affects all EspoCRM versions prior to 9.3.4.

The vulnerability resides in EspoCRM's built-in formula scripting engine — a feature that enables administrators to automate field updates and business logic using a custom scripting language. Through this engine, an authenticated administrator can update the sourceId field on Attachment entities, a field that should be immutable after an attachment is created. Overwriting sourceId allows an attacker to point attachments at arbitrary file system paths or internal resources, enabling unauthorized data access or manipulation.


Technical Details

Vulnerability Root Cause

EspoCRM's formula scripting engine exposes functions that allow updating entity fields programmatically. The engine fails to enforce write restrictions on the sourceId field of Attachment records. This field acts as a reference to the underlying file storage location.

An authenticated admin who can execute formula scripts — a common configuration — can craft a formula expression that sets sourceId to an attacker-controlled value, redirecting attachment references to arbitrary locations.

Attack Scenario

  1. Attacker authenticates as an EspoCRM administrator (or compromises an admin account).
  2. Attacker creates or modifies a formula script targeting the Attachment entity type.
  3. The formula sets sourceId to a controlled path or foreign identifier.
  4. Subsequent reads or exports of the attachment resolve against the manipulated sourceId, returning data the attacker designates.

Why sourceId Matters

In EspoCRM, sourceId links an Attachment record to its underlying file on disk or in object storage. Overwriting it can:

  • Redirect file downloads to sensitive server-side files
  • Corrupt attachment references across linked records (Emails, Documents, Notes)
  • Enable exfiltration of files the admin account would not normally be able to download through the UI

Affected Versions

SoftwareAffected Versions
EspoCRMAll versions prior to 9.3.4

CVSS Score Breakdown

MetricValue
Base Score9.1 (Critical)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh (Admin)
User InteractionNone
ScopeChanged
ImpactHigh Confidentiality, High Integrity

Patch & Mitigation

Patch: Upgrade to EspoCRM version 9.3.4 or later. The fix introduces validation that blocks formula script modifications to the sourceId field on Attachment entities.

Immediate mitigations for unpatched instances:

  1. Restrict formula scripting access — ensure only fully trusted administrators have access to EspoCRM formula configuration.
  2. Audit existing formula scripts for any expressions targeting Attachment.sourceId and remove or disable them.
  3. Review admin account hygiene — rotate credentials for all EspoCRM administrator accounts, particularly any shared or service accounts.
  4. Monitor attachment access logs for unusual download patterns or access to unexpected file paths.
  5. Apply the patch immediately — the low attack complexity and network exposure make this a high-priority remediation.

Recommendations

Organizations running EspoCRM versions prior to 9.3.4 should apply the patch immediately. While the vulnerability requires administrator-level credentials, admin account compromise is a realistic threat vector via phishing, credential stuffing, or lateral movement. The Changed scope rating reflects that successful exploitation can impact resources beyond the attacker's authentication boundary.

Audit your EspoCRM formula scripting configuration and ensure principle of least privilege is applied to all administrative accounts.

#CVE#EspoCRM#Access Control#Formula Scripting#CRM#NVD#Open Source

Related Articles

CVE-2026-41167: Jellystat Authenticated SQL Injection in Multiple API Endpoints (CVSS 9.1)

A critical SQL injection vulnerability in Jellystat, the open-source statistics app for Jellyfin, allows authenticated users to execute arbitrary SQL queries by injecting unsanitized request-body fields directly into raw SQL strings via POST /api/getUserDetails and other endpoints. Fixed in version 1.1.10.

4 min read

CVE-2026-33478: AVideo CloneSite Plugin Unauthenticated RCE (CVSS 10.0)

A critical chain of vulnerabilities in WWBN AVideo's CloneSite plugin allows fully unauthenticated attackers to achieve remote code execution via key...

4 min read

CVE-2026-39987: Marimo Pre-Auth Remote Code Execution — CISA KEV Added

A critical pre-authorization remote code execution vulnerability in Marimo, the open-source reactive Python notebook, allows unauthenticated attackers to gain shell access and execute arbitrary system commands. CISA has added this flaw to the Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

4 min read
Back to all Security Alerts