Dolibarr ERP & CRM <=15.0.3 is vulnerable to Eval injection. By default, any administrator can be added to the installation page of dolibarr, and if successfully added, malicious code can be inserted into the database and then execute it by eval.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-7cm4-vmf2-8wf2 | Dolibarr vulnerable to Eval Injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://github.com/youncyb/dolibarr-rce |
|
History
Thu, 15 May 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-05-15T15:01:22.559Z
Reserved: 2022-09-19T00:00:00.000Z
Link: CVE-2022-40871
Updated: 2024-08-03T12:28:42.656Z
Status : Modified
Published: 2022-10-12T12:15:09.657
Modified: 2025-05-15T15:16:03.143
Link: CVE-2022-40871
No data.
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA