In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.
History

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Authenticated Remote Code Execution via PHP Function Blacklist Bypass in Dolibarr Website Module
Weaknesses CWE-78
CWE-94
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Apr 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Dolibarr
Dolibarr dolibarr
Vendors & Products Dolibarr
Dolibarr dolibarr

Tue, 21 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-04-21T18:23:33.693Z

Reserved: 2026-03-09T00:00:00.000Z

Link: CVE-2026-31019

cve-icon Vulnrichment

Updated: 2026-04-21T18:23:22.402Z

cve-icon NVD

Status : Undergoing Analysis

Published: 2026-04-21T15:16:36.560

Modified: 2026-04-21T19:16:16.997

Link: CVE-2026-31019

cve-icon Redhat

No data.