CVE-2024-55228
Description
A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2024-55228 is a stored XSS vulnerability in Dolibarr v21.0.0-beta's Product module, allowing arbitrary script execution via the Title parameter.
Vulnerability
Overview
CVE-2024-55228 is a stored cross-site scripting (XSS) vulnerability identified in the Product module of Dolibarr ERP/CRM version 21.0.0-beta. The flaw resides in the processing of the Title parameter, which fails to properly sanitize user-supplied input before rendering it in the application's web interface. An attacker can inject arbitrary HTML or JavaScript code into this parameter [1].
Attack
Vector and Exploitation
Exploitation of this vulnerability does not require authentication; an attacker with network access to the Dolibarr instance could craft a malicious payload and inject it into the Title field when creating or editing a product. The injected script is stored in the database and subsequently executed in the browser of any user who views the affected product page. No special privileges or advanced network position are needed beyond the ability to submit data to the Product module [1][2].
Potential
Impact
Successful exploitation allows an attacker to execute arbitrary web scripts in the context of the victim's session. This could lead to theft of session cookies, impersonation of authenticated users, defacement of the application interface, or redirection to malicious external sites. As Dolibarr can manage sensitive business data (contacts, invoices, orders), the impact may extend to data exposure or manipulation within the organization's ERP/CRM system [1][3].
Mitigation
Status
As of the publication date, the vulnerability exists in Dolibarr v21.0.0-beta, which is a beta release and not a stable version. The project's security policy advises that only the last five major stable versions are supported for security reports [2]. A related commit referenced in advisories indicates that similar XSS issues were addressed in the codebase through the use of dolPrintHtmlForAttribute() instead of dol_escape_htmltag() [4]. Users are strongly recommended to upgrade to the latest stable release of Dolibarr and ensure all input sanitization routines are applied [2][4].
- NVD - CVE-2024-55228
- Build software better, together
- GitHub - Dolibarr/dolibarr: Dolibarr ERP CRM is a modern software package to manage your company or foundation's activity (contacts, suppliers, invoices, orders, stocks, agenda, accounting, ...). it's an open source Web application (written in PHP) designed for businesses of any sizes, foundations and freelancers.
- FIX CVE-2024-55227 and CVE-2024-55228 CSRF when · Dolibarr/dolibarr@56710ce
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
4- Dolibarr/Dolibarrdescription
- osv-coords2 versions
>= 21.0.0-beta, < 21.0.0+ 1 more
- (no CPE)range: >= 21.0.0-beta, < 21.0.0
- (no CPE)
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-x2j8-vjg7-386rghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2024-55228ghsaADVISORY
- gist.github.com/Dqtdqt/a942bbce9a5fc851dce366902411c768ghsaWEB
- github.com/Dolibarr/dolibarr/commit/56710ce9b79a97df093f586c90bdaf6cce6a5808ghsaWEB
- github.com/Dolibarr/dolibarr/commit/9aa24d9d9aeab36358c725dae3fe20c9631082e7ghsaWEB
- github.com/Dolibarr/dolibarr/commit/c0250e4c9106b5c889e512a4771f0205d4f99b99ghsaWEB
- github.com/Dolibarr/dolibarr/security/policyghsaWEB
News mentions
0No linked articles in our index yet.