Report: CVE-2026-33741 - EspoCRM: Stored XSS via SVG attachment loading same-origin JavaScript - Guide

Report: CVE-2026-33741 - EspoCRM: Stored XSS via SVG attachment loading same-origin JavaScript - Guide

CVE ID :CVE-2026-33741 Published : May 19, 2026, 7:16 p.m. | 46 minutes ago Description :EspoCRM is an open source customer relationship management application. Versions 9.3.3 and below allow authenticated users to upload SVG attachments through normal attachment-capable fields and later serve those SVG files as top-level inline documents through both the attachment and image entry points, resulting in stored cross-user XSS reachable through a normal attachment workflow. Although inline SVG script is blocked by the response CSP, the same CSP still allows same-origin external script. As a result, an attacker can upload a malicious SVG together with a second attacker-controlled JavaScript attachment, then trick another user into opening the SVG to execute JavaScript in the victim's EspoCRM origin. This issue has been fixed in version 9.3.4. Severity: 6.8 | MEDIUM Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
MEDIUM
Published
May 19, 2026
Impact: XSS