Impact
Dolibarr ERP/CRM versions prior to 23.0.2 allow authenticated administrators to execute arbitrary code. The vulnerability resides in the dol_eval_standard() function, which fails to enforce forbidden string checks in whitelist mode and does not recognize PHP dynamic callable syntax. By injecting malicious payloads through computed extrafields or other evaluation paths, an attacker can use PHP dynamic callable syntax to bypass validation, trigger eval(), and run arbitrary commands on the server. This flaw is classified under CWE-95 and can lead to full system compromise, including data theft, modification and denial of service.
Affected Systems
This issue affects all Dolibarr ERP/CRM installations running a version older than 23.0.2. If administrator accounts exist and are compromised, the attacker can exploit the vulnerability. Users running newer releases are not affected.
Risk and Exploitability
The flaw has a CVSS score of 8.6, indicating severe impact. No EPSS score is provided, and the vulnerability is not listed in CISA’s KEV catalog. The attack requires authenticated access with administrator privileges, which are typically restricted to a small number of users. Once exploited, the attacker can achieve remote code execution and thus full control over the affected system. Due to the lack of a publicly available exploit, the true likelihood of exploitation is uncertain, but the high CVSS score and potential for catastrophic damage make it a serious risk.
OpenCVE Enrichment