CVE-2025-67486
HIGH
8,6
Source: [email protected]
Attack Vector: network
Attack Complexity: low
Privileges Required: high
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
Description
AI Translation Available
Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. Versions 22.0.2 and earlier contains an authenticated remote code execution vulnerability in the user extrafields functionality. User-controlled input from the 'computed value' field is passed to PHP's `eval()` function without adequate sanitization, allowing authenticated administrators to execute arbitrary PHP code on the server. As of time of publication, no patched versions are available.
74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
IncompleteCommon Consequences
Security Scopes Affected:
Confidentiality
Access Control
Other
Integrity
Non-Repudiation
Potential Impacts:
Read Application Data
Bypass Protection Mechanism
Alter Execution Logic
Other
Hide Activities
Applicable Platforms
All platforms may be affected
https://medium.com/@abduxalilovjavohir/dolibarr-erp-authenticated-remote-code-e…
https://github.com/Dolibarr/dolibarr/blob/22.0.2/htdocs/core/lib/functions.lib.…
https://medium.com/@abduxalilovjavohir/dolibarr-erp-authenticated-remote-code-e…