CVE-2023-33568
Description
An issue in Dolibarr 16 before 16.0.5 allows unauthenticated attackers to perform a database dump and access a company's entire customer file, prospects, suppliers, and employee information if a contact file exists.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2023-33568 is an unauthenticated database dump vulnerability in Dolibarr 16.x before 16.0.5, exposing contact files and sensitive business data.
Vulnerability
Overview
CVE-2023-33568 is an authentication bypass vulnerability in Dolibarr ERP/CRM versions 16.x prior to 16.0.5. The issue resides in the file htdocs/public/ticket/ajax/ajax.php, which is accessible without authentication. An unauthenticated attacker can exploit this script to dump the entire contact database, including customers, prospects, suppliers, and employee information, as well as public and private notes associated with those contacts [1][2][3]. The root cause is insufficient access control on the AJAX endpoint, which fails to verify the user's session before processing requests [3].
Exploitation and
Attack Surface
The vulnerability can be exploited remotely by sending crafted HTTP requests to the vulnerable script without any prior authentication. The attacker needs only network access to the Dolibarr instance (e.g., over the internet or local network). The exploit does not require any special privileges or user interaction, making it easy to automate [3]. The vulnerable script was present in all version 16.x releases from 16.0.0 through 16.0.4 [4][3].
Impact
Successful exploitation allows an attacker to retrieve the full database of contact records, which may include sensitive personal and business information. This data breach can lead to identity theft, targeted phishing, competitive intelligence gathering, and reputational damage for the affected organization [3]. The vulnerability is marked as critical due to the high confidentiality impact and low attack complexity.
Mitigation
The vulnerability was fixed in Dolibarr version 16.0.5, released on 2023-03-22 [3][4]. Users are strongly advised to upgrade to 16.0.5 or later, or replace the vulnerable ajax.php file with the patched version provided by the vendor [4]. Version 15 and earlier versions are not affected, nor is version 17 [4]. No workaround other than applying the patch is available. The CVE was published on 2023-06-13 [2].
- GitHub - Dolibarr/dolibarr: Dolibarr ERP CRM is a modern software package to manage your company or foundation's activity (contacts, suppliers, invoices, orders, stocks, agenda, accounting, ...). it's an open source Web application (written in PHP) designed for businesses of any sizes, foundations and freelancers.
- NVD - CVE-2023-33568
- Dolibarr : unauthenticated contacts database theft
- Dolibarr 16.0 - Security breach
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dolibarr/dolibarrPackagist | >= 16.0.0, < 16.0.5 | 16.0.5 |
Affected products
3- Dolibarr/Dolibarrdescription
- osv-coords2 versions
>= 16.0.0, < 16.0.5+ 1 more
- (no CPE)range: >= 16.0.0, < 16.0.5
- (no CPE)range: >= 16.0.0, < 16.0.5
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- github.com/advisories/GHSA-fpvg-m786-h5vrghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-33568ghsaADVISORY
- github.com/Dolibarr/dolibarr/commit/bb7b69ef43673ed403436eac05e0bc31d5033ff7ghsaWEB
- github.com/Dolibarr/dolibarr/commit/be82f51f68d738cce205f4ce5b469ef42ed82d9eghsaWEB
- www.dolibarr.org/forum/t/dolibarr-16-0-security-breach/23471ghsaWEB
- www.dolibarr.org/forum/t/dolibarr-16-0-security-breach/23471/1ghsaWEB
- www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dumpghsaWEB
- www.dsecbypass.com/en/dolibarr-pre-auth-contact-database-dump/mitre
News mentions
0No linked articles in our index yet.