Medium severity5.0NVD Advisory· Published May 3, 2026· Updated May 5, 2026
CVE-2026-7688
CVE-2026-7688
Description
A vulnerability was identified in Dolibarr ERP CRM up to 23.0.2. This affects the function _checkValForAPI of the file htdocs/expedition/class/expedition.class.php of the component Shipments API Endpoint. The manipulation of the argument fields leads to sql injection. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
dolibarr/dolibarrPackagist | <= 23.0.2 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/advisories/GHSA-rvwr-q5hj-wq7gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2026-7688ghsaADVISORY
- vuldb.com/submit/799337nvdWEB
- vuldb.com/vuln/360858nvdWEB
- vuldb.com/vuln/360858/ctinvdWEB
News mentions
1- Metasploit Wrap-Up 05/15/2026Rapid7 Blog · May 15, 2026