Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sun, 03 May 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in Dolibarr ERP CRM up to 23.0.2. This affects the function _checkValForAPI of the file htdocs/expedition/class/expedition.class.php of the component Shipments API Endpoint. The manipulation of the argument fields leads to sql injection. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection | |
| Weaknesses | CWE-74 CWE-89 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-03T09:15:11.998Z
Reserved: 2026-05-02T16:27:22.949Z
Link: CVE-2026-7688
No data.
Status : Received
Published: 2026-05-03T10:16:17.170
Modified: 2026-05-03T10:16:17.170
Link: CVE-2026-7688
No data.
OpenCVE Enrichment
Updated: 2026-05-03T10:30:15Z