CVE-2021-33618
Description
Dolibarr ERP and CRM 13.0.2 allows XSS via object details, as demonstrated by > and < characters in the onpointermove attribute of a BODY element to the user-management feature.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Dolibarr ERP/CRM 13.0.2 is vulnerable to stored XSS via unescaped HTML in object details, allowing arbitrary JavaScript execution.
Vulnerability
Dolibarr ERP and CRM version 13.0.2 does not escape "greater than" (>) and "smaller than" (<) characters when they are reflected in pop-up windows showing object details [3][4]. This allows an attacker to inject arbitrary HTML tags and attributes. The vulnerability is present in the user-management feature, specifically in the group card page (/user/group/card.php) [3]. The affected version is 13.0.2 [2][3].
Exploitation
An attacker must have a valid user account with privileges to modify group names (e.g., via the user-management feature) [3]. The attacker sends a POST request to /user/group/card.php with a crafted group name containing a ` element [3]. When an administrator or other user views the group details in a pop-up window, the injected HTML is rendered and the onpointermove` event handler executes arbitrary JavaScript [3]. No user interaction beyond viewing the pop-up is required.
Impact
Successful exploitation results in stored cross-site scripting (XSS) [2][3]. The attacker can execute arbitrary JavaScript in the context of the victim's session, potentially leading to session hijacking, data theft, or further compromise of the Dolibarr instance. The CVSS score is 9.0 (Critical) with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H [3].
Mitigation
The vendor has not released a specific patch for CVE-2021-33618 in the 13.x branch; however, later versions (e.g., 23.0.3) include numerous security fixes [1]. Users should upgrade to the latest available version of Dolibarr. As a workaround, administrators can restrict access to the user-management feature to trusted users only. No official advisory from the vendor is available in the provided references.
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dolibarr/dolibarrPackagist | <= 13.0.2 | — |
Affected products
3- Dolibarr/ERP and CRMdescription
- osv-coords2 versions
>= 13.0.2, <= 13.0.2+ 1 more
- (no CPE)range: >= 13.0.2, <= 13.0.2
- (no CPE)range: <= 13.0.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-fc6h-769x-gff5ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-33618ghsaADVISORY
- seclists.org/fulldisclosure/2021/Nov/38ghsamailing-listx_refsource_FULLDISCWEB
- trovent.github.io/security-advisories/TRSA-2105-02/TRSA-2105-02.txtghsax_refsource_MISCWEB
- trovent.io/security-advisory-2105-02ghsax_refsource_MISCWEB
News mentions
0No linked articles in our index yet.