{"uuid": "6389853f-bb98-4786-80c2-8f9c9b543dd2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-25960", "type": "seen", "source": "https://t.me/cibsecurity/29644", "content": "\u203c CVE-2021-25960 \u203c\n\nIn \u00e2\u20ac\u0153SuiteCRM\u00e2\u20ac\ufffd application, v7.11.18 through v7.11.19 and v7.10.29 through v7.10.31 are affected by \u00e2\u20ac\u0153CSV Injection\u00e2\u20ac\ufffd vulnerability (Formula Injection). A low privileged attacker can use accounts module to inject payloads in the input fields. When an administrator access accounts module to export the data as a CSV file and opens it, the payload gets executed. This was not fixed properly as part of CVE-2020-15301, allowing the attacker to bypass the security measure.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2021-09-29T18:36:55.000000Z"}