CVE-2020-37094
Published: 03 February 2026
Description
EspoCRM 5.8.5 contains an authentication vulnerability that allows attackers to access other user accounts by manipulating authorization headers. Attackers can decode and modify Basic Authorization and Espo-Authorization tokens to gain unauthorized access to administrative user information and privileges.
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates CVE-2020-37094 by requiring identification, reporting, and timely remediation of the authentication flaw in EspoCRM through patching or updates.
Requires management of authorization tokens with sufficient strength of mechanism and protection against unauthorized modification, preventing attackers from decoding and forging them.
Enforces approved authorizations based on validated authentication, rejecting access attempts using manipulated Basic Authorization and Espo-Authorization headers.
Security SummaryAI
CVE-2020-37094 is an authentication vulnerability in EspoCRM version 5.8.5 that enables attackers to access other user accounts by manipulating authorization headers. Specifically, attackers can decode and modify Basic Authorization and Espo-Authorization tokens to gain unauthorized access to administrative user information and privileges. The vulnerability is classified under CWE-639 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity with network accessibility, low attack complexity, and no requirements for privileges or user interaction.
Remote, unauthenticated attackers can exploit this vulnerability over the network by intercepting or crafting modified authorization tokens, allowing them to impersonate other users, including administrators. Successful exploitation grants high-impact access to sensitive data, enables privilege escalation, and potentially disrupts system availability through unauthorized actions.
Advisories and resources for mitigation are available from the vendor at https://www.espocrm.com, an exploit proof-of-concept at https://www.exploit-db.com/exploits/48376, and a detailed privilege escalation advisory at https://www.vulncheck.com/advisories/espocrm-privilege-escalation. The presence of a public exploit on Exploit-DB indicates practical exploitability in unpatched environments.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE enables exploitation of a public-facing web application (EspoCRM) for unauthorized access (T1190) and privilege escalation to admin via auth token manipulation (T1068).