Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64493: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in SuiteCRM SuiteCRM-Core

0
Medium
VulnerabilityCVE-2025-64493cvecve-2025-64493cwe-89
Published: Sat Nov 08 2025 (11/08/2025, 01:16:22 UTC)
Source: CVE Database V5
Vendor/Project: SuiteCRM
Product: SuiteCRM-Core

Description

SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 8.6.0 through 8.9.0, there is an authenticated, blind (time-based) SQL-injection inside the appMetadata-operation of the GraphQL-API. This allows extraction of arbitrary data from the database, and does not require administrative access. This issue is fixed in version 8.9.1.

AI-Powered Analysis

AILast updated: 11/15/2025, 04:48:45 UTC

Technical Analysis

The vulnerability identified as CVE-2025-64493 affects SuiteCRM-Core, an open-source CRM platform widely used by enterprises. Specifically, versions 8.6.0 through 8.9.0 contain an authenticated, blind SQL injection flaw in the appMetadata operation of the GraphQL API. This flaw arises from improper neutralization of special elements in SQL commands (CWE-89), enabling attackers with valid user credentials (but not requiring administrative privileges) to perform time-based blind SQL injection attacks. Exploiting this vulnerability allows attackers to extract arbitrary data from the backend database, compromising confidentiality. The attack vector is remote network access (AV:N), requires low attack complexity (AC:L), and no user interaction (UI:N). The vulnerability does not allow modification or deletion of data (integrity unaffected) nor does it impact system availability. The issue was publicly disclosed on November 8, 2025, and fixed in SuiteCRM version 8.9.1. No known exploits are reported in the wild yet. The CVSS v3.1 base score is 6.5, reflecting a medium severity level primarily due to the confidentiality impact and ease of exploitation by authenticated users.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of sensitive customer and business data stored within SuiteCRM databases. Since SuiteCRM is used by various sectors including finance, healthcare, and public services across Europe, unauthorized data extraction could lead to exposure of personal data protected under GDPR, resulting in regulatory penalties and reputational damage. The fact that the vulnerability requires only authenticated user access but not administrative privileges broadens the potential attacker base, including insider threats or compromised user accounts. Although the vulnerability does not affect data integrity or availability, the loss of confidentiality could facilitate further attacks or data misuse. Organizations relying on SuiteCRM versions prior to 8.9.1 should consider this a priority risk, especially those with high-value or regulated data.

Mitigation Recommendations

European organizations should immediately upgrade all affected SuiteCRM-Core instances to version 8.9.1 or later, where the vulnerability is patched. Until upgrade is possible, implement strict access controls to limit user privileges and monitor GraphQL API usage for unusual query patterns indicative of SQL injection attempts. Employ Web Application Firewalls (WAFs) with rules targeting SQL injection in GraphQL endpoints. Conduct thorough audits of user accounts to detect and disable compromised or unnecessary accounts. Additionally, enable detailed logging and alerting on database query anomalies. Regularly review and update incident response plans to address potential data breaches stemming from this vulnerability. Finally, ensure that backups are securely maintained to support recovery in case of exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-05T19:12:25.103Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690e9f0a3a8fd010ecd0f4f2

Added to database: 11/8/2025, 1:38:18 AM

Last enriched: 11/15/2025, 4:48:45 AM

Last updated: 12/21/2025, 9:42:28 PM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats