{"id":"CVE-2025-64493","summary":"SuiteCRM is Vulnerable to Authenticated Blind SQL Injection via GraphQL","details":"SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 8.6.0 through 8.9.0, there is an authenticated, blind (time-based) SQL-injection inside the appMetadata-operation of the GraphQL-API. This allows extraction of arbitrary data from the database, and does not require administrative access. This issue is fixed in version 8.9.1.","aliases":["GHSA-5gcj-mfqq-v8f7"],"modified":"2026-03-13T03:41:04.950318Z","published":"2025-11-08T01:16:22.833Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64493.json","cna_assigner":"GitHub_M","cwe_ids":["CWE-89"]},"references":[{"type":"WEB","url":"https://docs.suitecrm.com/community/security-policy"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/64xxx/CVE-2025-64493.json"},{"type":"ADVISORY","url":"https://github.com/SuiteCRM/SuiteCRM-Core/security/advisories/GHSA-5gcj-mfqq-v8f7"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-64493"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/salesagility/suitecrm-core","events":[{"introduced":"0820b6acc28a04b6386dc860f15ded621b8add27"},{"fixed":"682dd9bc23bec55d05b8c5cae9f259e242d3b6cc"}],"database_specific":{"versions":[{"introduced":"8.6.0"},{"fixed":"8.9.1"}]}}],"versions":["v8.6.0","v8.6.1","v8.6.2","v8.7.0","v8.7.0-beta","v8.7.1","v8.8.0","v8.8.0-beta","v8.8.1","v8.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64493.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/suitecrm/suitecrm-core","events":[{"introduced":"0820b6acc28a04b6386dc860f15ded621b8add27"},{"fixed":"682dd9bc23bec55d05b8c5cae9f259e242d3b6cc"}],"database_specific":{"versions":[{"introduced":"8.6.0"},{"fixed":"8.9.1"}]}}],"versions":["v8.6.0","v8.6.1","v8.6.2","v8.7.0","v8.7.0-beta","v8.7.1","v8.8.0","v8.8.0-beta","v8.8.1","v8.9.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-64493.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}