VYPR
Critical severityNVD Advisory· Published Nov 17, 2022· Updated Apr 30, 2025

CVE-2022-43138

CVE-2022-43138

Description

Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Dolibarr ERP/CRM before 14.0.1 allows privilege escalation via a crafted API request, due to missing permission checks in REST endpoints.

Vulnerability

Analysis

The vulnerability lies in the REST API endpoints of the Users class in Dolibarr ERP/CRM. In versions prior to 14.0.1, several API methods such as get(), getByLogin(), and getByEmail() had their permission checks commented out, allowing any authenticated user to call them without proper authorization [1]. The commit that fixes this issue restores the checks for the user->user->lire permission, which verifies that the requester has read access to user data.

Exploitation

An attacker with a low-privileged account can exploit this by crafting API requests to the unprotected endpoints. For example, the get() method (which returns user details by ID) originally had its permission check disabled. An attacker could enumerate other users, including administrators, by sending direct API calls. According to an exploit published on Exploit-DB, this chain of issues can be used to compromise any Dolibarr user account, including the admin [3].

Impact

Successful exploitation leads to privilege escalation. The attacker gains unauthorized access to user data and potentially administrative functions. This could result in full compromise of the Dolibarr instance, exposing sensitive business data and allowing further malicious actions.

Mitigation

The vulnerability is patched in Dolibarr version 14.0.1 [1]. Users should upgrade immediately to the latest version. The official commit and the exploit-DB entry both reference the fix. No workarounds are mentioned, so upgrading is the recommended course of action [4].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
dolibarr/dolibarrPackagist
< 14.0.114.0.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.