CVE-2023-38888
Description
Cross Site Scripting vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the REST API module, related to analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stored XSS in Dolibarr ERP CRM <=17.0.1 via REST API allows remote unauthenticated attackers to execute arbitrary JavaScript and steal sensitive data.
Vulnerability
Overview CVE-2023-38888 is a stored Cross-Site Scripting (XSS) vulnerability in Dolibarr ERP CRM versions 17.0.1 and earlier, specifically within the REST API module [1][2]. The root cause lies in insufficient input sanitization in the functions analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject, which fail to properly neutralize user-supplied data before it is stored or reflected [2][3].
Exploitation
An unauthenticated remote attacker can exploit this flaw by sending crafted HTTP requests to the REST API endpoints. Because the vulnerability is stored, the injected malicious script is persisted on the server and subsequently executed in the browser of any user who views the affected data, including administrators [3]. No special privileges or network position beyond network access to the Dolibarr instance is required.
Impact
Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to theft of sensitive information (e.g., session cookies, CSRF tokens), defacement, or further compromise of the Dolibarr instance through actions performed on behalf of the victim [2][3].
Mitigation
The vendor has released a fix in a subsequent version; users are strongly advised to upgrade to the latest Dolibarr release [1][4]. No official workaround is available, and the vulnerability has been publicly disclosed with proof-of-concept details [3].
- GitHub - Dolibarr/dolibarr: Dolibarr ERP CRM is a modern software package to manage your company or foundation's activity (contacts, suppliers, invoices, orders, stocks, agenda, accounting, ...). it's an open source Web application (written in PHP) designed for businesses of any sizes, foundations and freelancers.
- NVD - CVE-2023-38888
- Magellan Sécurité, integrating protection solutions
- Dolibarr Open Source ERP and CRM - Web suite for business
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dolibarr/dolibarrPackagist | < 17.0.1 | 17.0.1 |
Affected products
3- Dolibarr/Dolibarr ERP CRMdescription
- osv-coords2 versions
<= 17.0.1+ 1 more
- (no CPE)range: <= 17.0.1
- (no CPE)range: < 17.0.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.