VYPR
Critical severityNVD Advisory· Published Sep 20, 2023· Updated Sep 25, 2024

CVE-2023-38888

CVE-2023-38888

Description

Cross Site Scripting vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to obtain sensitive information and execute arbitrary code via the REST API module, related to analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in Dolibarr ERP CRM <=17.0.1 via REST API allows remote unauthenticated attackers to execute arbitrary JavaScript and steal sensitive data.

Vulnerability

Overview CVE-2023-38888 is a stored Cross-Site Scripting (XSS) vulnerability in Dolibarr ERP CRM versions 17.0.1 and earlier, specifically within the REST API module [1][2]. The root cause lies in insufficient input sanitization in the functions analyseVarsForSqlAndScriptsInjection and testSqlAndScriptInject, which fail to properly neutralize user-supplied data before it is stored or reflected [2][3].

Exploitation

An unauthenticated remote attacker can exploit this flaw by sending crafted HTTP requests to the REST API endpoints. Because the vulnerability is stored, the injected malicious script is persisted on the server and subsequently executed in the browser of any user who views the affected data, including administrators [3]. No special privileges or network position beyond network access to the Dolibarr instance is required.

Impact

Successful exploitation allows an attacker to execute arbitrary JavaScript in the context of the victim's session. This can lead to theft of sensitive information (e.g., session cookies, CSRF tokens), defacement, or further compromise of the Dolibarr instance through actions performed on behalf of the victim [2][3].

Mitigation

The vendor has released a fix in a subsequent version; users are strongly advised to upgrade to the latest Dolibarr release [1][4]. No official workaround is available, and the vulnerability has been publicly disclosed with proof-of-concept details [3].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
dolibarr/dolibarrPackagist
< 17.0.117.0.1

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.