Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | EspoCRM <= 9.3.3 contains an authenticated server-side request forgery caused by improper internal-host validation using alternative IPv4 formats in HostCheck::isNotInternalHost(), letting authenticated users access internal resources via /api/v1/Attachment/fromImageUrl endpoint. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2026/CVE-2026-33534.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-33740 | 5.4 MEDIUM | EspoCRM: Email importEml can import and delete another user's attachment by raw fileId |
| CVE-2026-33657 | 4.6 MEDIUM | EspoCRM: Stored HTML injection in email notifications about stream notes via unescaped pos |
| CVE-2026-33659 | 3.5 LOW | EspoCRM: SSRF via DNS Rebinding in Attachment fromImageUrl Endpoint Allows Internal Networ |
No comments yet