{"id":"CVE-2022-50589","details":"SuiteCRM versions prior to 7.12.6 contain a SQL injection vulnerability within the processing of the ‘uid’ parameter within the ‘export’ functionality. Successful exploitation allows remote unauthenticated attackers to ultimately execute arbitrary code.","modified":"2026-04-02T08:31:49.211622Z","published":"2025-11-06T20:15:36.787Z","references":[{"type":"ADVISORY","url":"https://blog.exodusintel.com/2022/06/09/salesagility-suitecrm-export-request-sql-injection-vulnerability/"},{"type":"ADVISORY","url":"https://docs.suitecrm.com/admin/releases/7.12.x/#_7_12_6"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/suitecrm-sqli-via-export-functionality"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/salesagility/suitecrm","events":[{"introduced":"0"},{"fixed":"51e182b29271876a9518bcef0c5c313c4a273954"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.12.6"}]}}],"versions":["7.1.7","7.2.2","7.9.15","7.9.6","v.7.9.11","v7.0.1","v7.0.2","v7.1","v7.1.1","v7.1.2","v7.1.3","v7.1.4","v7.1.5","v7.1.6","v7.1.7","v7.1.8","v7.10-RC","v7.10-RC-2","v7.10-beta","v7.10-beta-2","v7.10-beta-3","v7.10.0","v7.10.1","v7.10.10","v7.10.11","v7.10.12","v7.10.13","v7.10.14","v7.10.15","v7.10.16","v7.10.17","v7.10.18","v7.10.19","v7.10.2","v7.10.20","v7.10.21","v7.10.22","v7.10.23","v7.10.24","v7.10.25","v7.10.26","v7.10.27","v7.10.28","v7.10.29","v7.10.3","v7.10.30","v7.10.31","v7.10.32","v7.10.33","v7.10.34","v7.10.35","v7.10.36","v7.10.4","v7.10.5","v7.10.6","v7.10.7","v7.10.8","v7.10.9","v7.11-beta","v7.11-rc","v7.11-rc-2","v7.11.0","v7.11.1","v7.11.10","v7.11.11","v7.11.12","v7.11.13","v7.11.14","v7.11.15","v7.11.16","v7.11.17","v7.11.18","v7.11.19","v7.11.2","v7.11.20","v7.11.21","v7.11.22","v7.11.23","v7.11.3","v7.11.4","v7.11.5","v7.11.6","v7.11.7","v7.11.8","v7.11.9","v7.12-rc","v7.12.0","v7.12.1","v7.12.2","v7.12.3","v7.12.4","v7.12.5","v7.1RC","v7.1RC2","v7.1beta","v7.1beta2","v7.2","v7.2.1","v7.2.2","v7.2.3","v7.2.4","v7.2beta","v7.2beta2","v7.2beta3","v7.3","v7.3-beta","v7.3.1","v7.3.2","v7.3beta3","v7.4","v7.4-beta","v7.4-beta.2","v7.4-rc","v7.4.1","v7.4.2","v7.4.3","v7.5","v7.5-beta","v7.5-beta.2","v7.5-rc","v7.5.1","v7.5.2","v7.5.3","v7.5.4","v7.5.5","v7.6","v7.6-beta-1","v7.6-beta.2","v7.6-rc","v7.6.1","v7.6.10","v7.6.2","v7.6.3","v7.6.4","v7.6.5","v7.6.6","v7.6.7","v7.6.8","v7.6.9","v7.7","v7.7-beta1","v7.7-beta2","v7.7-rc","v7.7-rc2","v7.7.1","v7.7.2","v7.7.3","v7.7.4","v7.7.5","v7.7.6","v7.7.7","v7.7.8","v7.7.9","v7.8.0","v7.8.0-beta","v7.8.0-beta.2","v7.8.0-rc","v7.8.1","v7.8.10","v7.8.11","v7.8.12","v7.8.13","v7.8.14","v7.8.15","v7.8.16","v7.8.17","v7.8.18","v7.8.19","v7.8.2","v7.8.20","v7.8.21","v7.8.22","v7.8.23","v7.8.24","v7.8.25","v7.8.26","v7.8.27","v7.8.28","v7.8.29","v7.8.3","v7.8.30","v7.8.31","v7.8.4","v7.8.5","v7.8.6","v7.8.7","v7.8.8","v7.8.9","v7.9.0","v7.9.0-beta","v7.9.0-rc","v7.9.1","v7.9.10","v7.9.11","v7.9.12","v7.9.13","v7.9.14","v7.9.16","v7.9.17","v7.9.2","v7.9.3","v7.9.4","v7.9.5","v7.9.7","v7.9.8","v7.9.9","v8.0.0-beta.1"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50589.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}