Description
Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code execution vulnerability in the dol_eval_standard() function that fails to apply forbidden string checks in whitelist mode and does not detect PHP dynamic callable syntax. Attackers with administrator privileges can inject malicious payloads through computed extrafields or other evaluation paths using PHP dynamic callable syntax to bypass validation and achieve arbitrary command execution via eval().
Published: 2026-04-07
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

Dolibarr ERP/CRM versions prior to 23.0.2 allow authenticated administrators to execute arbitrary code. The vulnerability resides in the dol_eval_standard() function, which fails to enforce forbidden string checks in whitelist mode and does not recognize PHP dynamic callable syntax. By injecting malicious payloads through computed extrafields or other evaluation paths, an attacker can use PHP dynamic callable syntax to bypass validation, trigger eval(), and run arbitrary commands on the server. This flaw is classified under CWE-95 and can lead to full system compromise, including data theft, modification and denial of service.

Affected Systems

This issue affects all Dolibarr ERP/CRM installations running a version older than 23.0.2. If administrator accounts exist and are compromised, the attacker can exploit the vulnerability. Users running newer releases are not affected.

Risk and Exploitability

The flaw has a CVSS score of 8.6, indicating severe impact. No EPSS score is provided, and the vulnerability is not listed in CISA’s KEV catalog. The attack requires authenticated access with administrator privileges, which are typically restricted to a small number of users. Once exploited, the attacker can achieve remote code execution and thus full control over the affected system. Due to the lack of a publicly available exploit, the true likelihood of exploitation is uncertain, but the high CVSS score and potential for catastrophic damage make it a serious risk.

Generated by OpenCVE AI on April 7, 2026 at 19:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify the currently installed Dolibarr version and compare it to 23.0.2 or later.
  • If the current version is older, apply the Dolibarr 23.0.2 update, which patches dol_eval_standard() and restores proper input validation.
  • After updating, restart the web server and verify that the function no longer accepts unsafe expressions.
  • Restrict or remove unnecessary administrator accounts to reduce the attack surface.
  • Monitor web server logs for unexpected eval() usage or command execution attempts.
  • If an update is not immediately possible, consider disabling or replacing any modules that leverage dol_eval_standard() in computed extrafields until a patch is available.

Generated by OpenCVE AI on April 7, 2026 at 19:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Apr 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Dolibarr dolibarr Erp\/crm
Weaknesses CWE-94
CPEs cpe:2.3:a:dolibarr:dolibarr_erp\/crm:*:*:*:*:*:*:*:*
Vendors & Products Dolibarr dolibarr Erp\/crm

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dolibarr
Dolibarr dolibarr Erp/crm
Vendors & Products Dolibarr
Dolibarr dolibarr Erp/crm

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description Dolibarr ERP/CRM versions prior to 23.0.2 contain an authenticated remote code execution vulnerability in the dol_eval_standard() function that fails to apply forbidden string checks in whitelist mode and does not detect PHP dynamic callable syntax. Attackers with administrator privileges can inject malicious payloads through computed extrafields or other evaluation paths using PHP dynamic callable syntax to bypass validation and achieve arbitrary command execution via eval().
Title Dolibarr ERP/CRM < 23.0.2 Authenticated RCE via dol_eval_standard()
Weaknesses CWE-95
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Dolibarr Dolibarr Erp/crm Dolibarr Erp\/crm
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-04-07T13:43:14.034Z

Reserved: 2026-01-08T19:04:26.364Z

Link: CVE-2026-22666

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T13:16:45.200

Modified: 2026-04-24T14:20:46.840

Link: CVE-2026-22666

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:41Z

Weaknesses