Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-29109: CWE-502: Deserialization of Untrusted Data in SuiteCRM SuiteCRM-Core

0
High
VulnerabilityCVE-2026-29109cvecve-2026-29109cwe-502
Published: Thu Mar 19 2026 (03/19/2026, 23:12:11 UTC)
Source: CVE Database V5
Vendor/Project: SuiteCRM
Product: SuiteCRM-Core

Description

CVE-2026-29109 is a high-severity deserialization vulnerability in SuiteCRM versions prior to 8. 9. 3. It affects the SavedSearch filter processing component, where the application unserializes user-controlled data without restricting allowed classes. This flaw allows an authenticated administrator to execute arbitrary system commands on the server, potentially leading to full system compromise. The vulnerability arises from unsafe use of PHP's unserialize() function on data from the saved_search. contents database column. No user interaction beyond authentication is required, and the vulnerability does not require network-level access beyond normal admin privileges. Although no exploits are currently known in the wild, the risk is significant due to the potential impact and ease of exploitation by privileged users. Organizations using SuiteCRM versions before 8.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 19:38:43 UTC

Technical Analysis

CVE-2026-29109 is a critical deserialization vulnerability identified in SuiteCRM-Core, an open-source CRM platform widely used by enterprises. The vulnerability exists in versions up to and including 8.9.2 within the SavedSearch filter processing component. Specifically, the PHP file FilterDefinitionProvider.php calls the unserialize() function on data retrieved from the saved_search.contents database column. This data is user-controlled and lacks restrictions on which classes can be instantiated during deserialization, leading to unsafe deserialization (CWE-502). An authenticated administrator can exploit this flaw by crafting malicious serialized objects that, when unserialized, trigger arbitrary system command execution on the underlying server. This can lead to full system compromise, including data theft, service disruption, or pivoting within the network. The vulnerability does not require user interaction beyond authentication, and no network-level privileges beyond admin access are needed. SuiteCRM version 8.9.3 addresses this issue by implementing proper restrictions on deserialization or replacing unsafe unserialize calls. The CVSS 4.0 base score is 8.6, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. No known public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on affected SuiteCRM versions.

Potential Impact

The impact of CVE-2026-29109 is substantial for organizations using vulnerable SuiteCRM versions. Successful exploitation allows an authenticated administrator to execute arbitrary system commands, potentially leading to complete server takeover. This can result in unauthorized data access or modification, disruption of CRM services, and lateral movement within corporate networks. Given SuiteCRM's role in managing sensitive customer and business data, such a compromise could lead to data breaches, regulatory non-compliance, reputational damage, and financial losses. The vulnerability's exploitation requires admin privileges, which limits exposure to insider threats or attackers who have already compromised admin credentials. However, since SuiteCRM is often internet-facing or accessible within corporate intranets, attackers who gain admin access through phishing or other means could leverage this vulnerability to escalate privileges and control the underlying system. The absence of known exploits in the wild suggests a window for proactive patching before widespread attacks occur.

Mitigation Recommendations

To mitigate CVE-2026-29109, organizations should immediately upgrade SuiteCRM to version 8.9.3 or later, where the vulnerability is patched. If upgrading is not immediately feasible, administrators should restrict access to the SuiteCRM admin interface using network-level controls such as VPNs, IP whitelisting, or firewall rules to limit exposure. Implement strict credential management policies to prevent unauthorized admin access, including multi-factor authentication and regular password audits. Review and monitor logs for suspicious serialized data or unusual admin activity related to saved searches. Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block malicious serialized payloads targeting the saved_search.contents parameter. Additionally, conduct regular security assessments and penetration tests focusing on deserialization vulnerabilities. Educate administrators about the risks of unsafe deserialization and the importance of applying security patches promptly. Finally, isolate SuiteCRM servers from critical infrastructure to minimize potential lateral movement in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-03T21:54:06.709Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bc85a4e32a4fbe5f07b2dd

Added to database: 3/19/2026, 11:24:20 PM

Last enriched: 3/27/2026, 7:38:43 PM

Last updated: 5/3/2026, 4:12:45 PM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses