Dolibarr ERP CRM 7.0.3 Remote Code Evaluation via install/step1.php
Description
Dolibarr ERP CRM 7.0.3 contains a remote code evaluation vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting PHP code through the db_name parameter. Attackers can send a POST request to install/step1.php with malicious PHP code in the db_name parameter, then execute commands via the check.php endpoint using the cmd GET parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Dolibarr ERP CRM 7.0.3 allows unauthenticated remote code execution via PHP injection in the db_name parameter during installation.
Vulnerability
Dolibarr ERP CRM version 7.0.3 and earlier contain a remote code evaluation vulnerability in the installation script install/step1.php. The db_name POST parameter is not properly sanitized, allowing an attacker to inject arbitrary PHP code. This code is then written into the configuration file and can be executed via the install/check.php endpoint using the cmd GET parameter [3][4].
Exploitation
An unauthenticated attacker can send a crafted POST request to install/step1.php with a malicious db_name value such as x\';system($_GET[cmd]);//. After the installation step completes, the attacker visits install/check.php?cmd= to execute arbitrary system commands. No authentication or prior access is required [3].
Impact
Successful exploitation allows the attacker to execute arbitrary PHP code and system commands with the privileges of the web server user. This can lead to full compromise of the Dolibarr application, including data exfiltration, modification, and potential lateral movement within the hosting environment [4].
Mitigation
The vulnerability was fixed by the vendor on the same day it was reported (June 29, 2018) and is resolved in Dolibarr version 7.0.4 and later [3]. Users should upgrade to the latest supported version immediately. No workaround is available for unpatched installations. This CVE is not listed in CISA's Known Exploited Vulnerabilities catalog.
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: = 7.0.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/44964mitreexploit
- www.vulncheck.com/advisories/dolibarr-erp-crm-remote-code-evaluation-via-install-step1-phpmitrethird-party-advisory
- dolibarr.orgmitreproduct
News mentions
0No linked articles in our index yet.