{"id":"CVE-2022-50590","details":"SuiteCRM versions prior to 7.12.6 contain a type confusion vulnerability within the processing of the ‘module’ parameter within the ‘deleteAttachment’ functionality. Successful exploitation allows remote unauthenticated attackers to alter database objects including changing the email address of the administrator.","modified":"2026-03-14T12:00:46.766610Z","published":"2025-11-06T20:15:36.990Z","references":[{"type":"ADVISORY","url":"https://blog.exodusintel.com/2022/06/09/salesagility-suitecrm-deleteattachment-type-confusion-vulnerability/"},{"type":"ADVISORY","url":"https://docs.suitecrm.com/admin/releases/7.12.x/#_7_12_6"},{"type":"ADVISORY","url":"https://www.vulncheck.com/advisories/suitecrm-type-confusion-via-deleteattachment-functionality"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/salesagility/suitecrm","events":[{"introduced":"0"},{"fixed":"51e182b29271876a9518bcef0c5c313c4a273954"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.12.6"}]}}],"versions":["7.2.2","7.9.15","7.9.6","v.7.9.11","v7.0.1","v7.0.2","v7.1","v7.1.1","v7.1.2","v7.1.3","v7.1.4","v7.1.5","v7.10-RC","v7.10-RC-2","v7.10-beta","v7.10-beta-2","v7.10-beta-3","v7.10.0","v7.10.1","v7.10.10","v7.10.11","v7.10.12","v7.10.13","v7.10.14","v7.10.15","v7.10.16","v7.10.17","v7.10.18","v7.10.19","v7.10.2","v7.10.20","v7.10.21","v7.10.22","v7.10.23","v7.10.3","v7.10.4","v7.10.5","v7.10.6","v7.10.7","v7.10.8","v7.10.9","v7.11-beta","v7.11-rc","v7.11-rc-2","v7.11.0","v7.11.1","v7.11.10","v7.11.11","v7.11.12","v7.11.13","v7.11.14","v7.11.15","v7.11.16","v7.11.17","v7.11.18","v7.11.19","v7.11.2","v7.11.20","v7.11.21","v7.11.22","v7.11.3","v7.11.4","v7.11.5","v7.11.6","v7.11.7","v7.11.8","v7.11.9","v7.12-rc","v7.12.0","v7.12.1","v7.12.2","v7.12.3","v7.12.4","v7.12.5","v7.1RC","v7.1RC2","v7.1beta","v7.1beta2","v7.2","v7.2.1","v7.2.2","v7.2.3","v7.2.4","v7.2beta","v7.2beta2","v7.2beta3","v7.3","v7.3-beta","v7.3.1","v7.3.2","v7.3beta3","v7.4","v7.4-beta","v7.4-beta.2","v7.4.1","v7.4.2","v7.4.3","v7.5-beta","v7.5-beta.2","v7.5-rc","v7.5.1","v7.5.2","v7.5.3","v7.6","v7.6-beta-1","v7.6-beta.2","v7.6-rc","v7.6.1","v7.6.2","v7.6.3","v7.6.4","v7.6.5","v7.6.6","v7.7","v7.7-beta1","v7.7-beta2","v7.7-rc","v7.7-rc2","v7.7.1","v7.7.2","v7.7.3","v7.7.4","v7.7.5","v7.7.6","v7.7.7","v7.7.8","v7.7.9","v7.8.0","v7.8.0-beta","v7.8.0-beta.2","v7.8.0-rc","v7.8.1","v7.8.10","v7.8.11","v7.8.12","v7.8.13","v7.8.14","v7.8.15","v7.8.16","v7.8.17","v7.8.18","v7.8.19","v7.8.2","v7.8.20","v7.8.3","v7.8.4","v7.8.5","v7.8.6","v7.8.7","v7.8.8","v7.8.9","v7.9.0","v7.9.0-beta","v7.9.0-rc","v7.9.1","v7.9.10","v7.9.11","v7.9.12","v7.9.13","v7.9.14","v7.9.16","v7.9.17","v7.9.2","v7.9.3","v7.9.4","v7.9.5","v7.9.7","v7.9.8","v7.9.9"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-50590.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}