No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 22 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Website Module Bypass Enables Remote Code Execution in Dolibarr ERP & CRM |
Wed, 22 Apr 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authenticated Remote Code Execution via PHP Function Blacklist Bypass in Dolibarr Website Module | |
| Weaknesses | CWE-94 |
Wed, 22 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Authenticated Remote Code Execution via PHP Function Blacklist Bypass in Dolibarr Website Module | |
| Weaknesses | CWE-78 CWE-94 |
|
| Metrics |
cvssV3_1
|
Tue, 21 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dolibarr
Dolibarr dolibarr |
|
| Vendors & Products |
Dolibarr
Dolibarr dolibarr |
Tue, 21 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-21T18:23:33.693Z
Reserved: 2026-03-09T00:00:00.000Z
Link: CVE-2026-31019
Updated: 2026-04-21T18:23:22.402Z
Status : Undergoing Analysis
Published: 2026-04-21T15:16:36.560
Modified: 2026-04-21T19:16:16.997
Link: CVE-2026-31019
No data.
OpenCVE Enrichment
Updated: 2026-04-22T07:45:11Z