SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Sun, 05 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SuiteCRM 7.10.7 contains a time-based SQL injection vulnerability in the record parameter of the Users module DetailView action that allows authenticated attackers to manipulate database queries. Attackers can append SQL code to the record parameter in GET requests to the index.php endpoint to extract sensitive database information through time-based blind SQL injection techniques. | |
| Title | SuiteCRM 7.10.7 SQL Injection via record Parameter | |
| First Time appeared |
Salesagility
Salesagility suitecrm |
|
| Weaknesses | CWE-89 | |
| CPEs | cpe:2.3:a:salesagility:suitecrm:7.10.7:*:*:*:*:*:*:* | |
| Vendors & Products |
Salesagility
Salesagility suitecrm |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-05T20:45:18.735Z
Reserved: 2026-04-05T13:03:22.415Z
Link: CVE-2019-25664
No data.
Status : Received
Published: 2026-04-05T21:16:43.570
Modified: 2026-04-05T21:16:43.570
Link: CVE-2019-25664
No data.
OpenCVE Enrichment
No data.
Weaknesses