VYPR
Moderate severityNVD Advisory· Published Nov 10, 2021· Updated Aug 3, 2024

CVE-2021-33618

CVE-2021-33618

Description

Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Dolibarr ERP/CRM 13.0.2 is vulnerable to stored XSS via unescaped HTML in object details, allowing arbitrary JavaScript execution.

Vulnerability

Dolibarr ERP and CRM version 13.0.2 does not escape "greater than" (>) and "smaller than" (<) characters when they are reflected in pop-up windows showing object details [3][4]. This allows an attacker to inject arbitrary HTML tags and attributes. The vulnerability is present in the user-management feature, specifically in the group card page (/user/group/card.php) [3]. The affected version is 13.0.2 [2][3].

Exploitation

An attacker must have a valid user account with privileges to modify group names (e.g., via the user-management feature) [3]. The attacker sends a POST request to /user/group/card.php with a crafted group name containing a ` element [3]. When an administrator or other user views the group details in a pop-up window, the injected HTML is rendered and the onpointermove` event handler executes arbitrary JavaScript [3]. No user interaction beyond viewing the pop-up is required.

Impact

Successful exploitation results in stored cross-site scripting (XSS) [2][3]. The attacker can execute arbitrary JavaScript in the context of the victim's session, potentially leading to session hijacking, data theft, or further compromise of the Dolibarr instance. The CVSS score is 9.0 (Critical) with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H [3].

Mitigation

The vendor has not released a specific patch for CVE-2021-33618 in the 13.x branch; however, later versions (e.g., 23.0.3) include numerous security fixes [1]. Users should upgrade to the latest available version of Dolibarr. As a workaround, administrators can restrict access to the user-management feature to trusted users only. No official advisory from the vendor is available in the provided references.

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
dolibarr/dolibarrPackagist
<= 13.0.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.