SugarCRM (SaveDropDown) PHP Code Injection Vulnerability

• Affected Versions:

All versions prior to, 8.0.2, and 8.2.0.

• Vulnerability Description:

User input passed through key values of the “list_value” JSON parameter is not properly sanitized before being used to save PHP code when adding/saving dropdowns through the Module Builder. This can be exploited to inject and execute arbitrary PHP code. Successful exploitation of this vulnerability requires admin privileges.

• Solution:

Update to versions, 8.0.2, 8.2.0, or later.

• Disclosure Timeline:

[03/08/2018] – Vendor notified

[25/09/2018] – Fixed versions released and security advisory published

[31/12/2018] – Publication of this advisory

• CVE Reference:

The Common Vulnerabilities and Exposures project ( has not assigned a CVE identifier for this vulnerability.

• Credits:

Vulnerability discovered by Egidio Romano.

• Other References: