Dolibarr ERP CRM (<= 18.0.1) Improper Input Sanitization Authenticated RCE
Description
Improper input validation in Dolibarr ERP CRM <= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Dolibarr ERP CRM <=18.0.1 fails to sanitize PHP code in Website creation, allowing authenticated attackers to inject and execute arbitrary PHP code.
The vulnerability resides in the Website creation feature of Dolibarr ERP CRM versions up to 18.0.1. The application improperly validates user-supplied input when creating a website, failing to strip PHP code such as <?php ... ?> tags. This allows an attacker to inject arbitrary PHP code into the input, which is then evaluated by the server. The root cause is insufficient input sanitization, classified as CWE-20: Improper Input Validation [1][3].
To exploit this vulnerability, an attacker must have a low-privileged account on the Dolibarr instance and network access to the web interface. The attack complexity is rated as high (AC:H) because exploitation may require specific conditions or knowledge of the injection point. However, no user interaction is required, and the attack vector is network-based. The vulnerability is triggered during the creation of a website, where the injected PHP code is stored and later executed [1].
Successful exploitation allows the attacker to execute arbitrary PHP code with the privileges of the web server. This can lead to full compromise of confidentiality, integrity, and availability of the system, including reading sensitive data, modifying files, or executing system commands. The CVSS v3.1 base score is 7.5 (High) with vector AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H [3].
The issue has been fixed in later versions of Dolibarr. The commit 0ed6a63 addresses the vulnerability by adding proper input validation and stripping PHP code from user input [4]. Users are strongly advised to upgrade to a patched version. There is no known workaround, and the vulnerability is not listed in CISA's Known Exploited Vulnerabilities (KEV) as of the publication date.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dolibarr/dolibarrPackagist | < 18.0.2 | 18.0.2 |
Affected products
3- osv-coords2 versions
<= 18.0.1+ 1 more
- (no CPE)range: <= 18.0.1
- (no CPE)range: < 18.0.2
- Dolibarr/Dolibarr ERP CRMv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/Dolibarr/dolibarr/commit/0ed6a63fb06be88be5a4f8bcdee83185eee4087eghsapatchWEB
- github.com/advisories/GHSA-r9cm-pw9j-3fpxghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2023-4197ghsaADVISORY
- starlabs.sg/advisories/23/23-4197ghsathird-party-advisoryWEB
News mentions
0No linked articles in our index yet.