No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 20 Mar 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Suitecrm
Suitecrm suitecrm |
|
| Vendors & Products |
Suitecrm
Suitecrm suitecrm |
Thu, 19 Mar 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Prior to versions 7.15.1 and 8.9.3, the value of the return_id request parameter is copied into the value of an HTML tag attribute which is an event handler and is encapsulated in double quotation marks. Versions 7.15.1 and 8.9.3 patch the issue. Users should also use a Content Security Policy (CSP) header to completely mitigate XSS. | |
| Title | SuiteCRM has blind XSS in return_id parameter | |
| Weaknesses | CWE-116 CWE-159 CWE-79 CWE-80 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-20T14:59:59.888Z
Reserved: 2026-03-03T21:54:06.709Z
Link: CVE-2026-29106
Updated: 2026-03-20T14:59:56.225Z
Status : Undergoing Analysis
Published: 2026-03-19T23:16:43.500
Modified: 2026-03-20T13:37:50.737
Link: CVE-2026-29106
No data.
OpenCVE Enrichment
Updated: 2026-03-20T10:43:55Z