CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

dolibarr

dolibarr

21 known vulnerabilities · sorted by CVSS score

CVE-2018-16809
CRITICAL9.8

An issue was discovered in Dolibarr through 7.0.0. expensereport/card.php in the expense reports module allows SQL injection via the integer parameters qty and value_unit.

dolibarr / dolibarr
Network
Published Mar 7, 2019
Page 1 of 2
CVE-2018-9019
CRITICAL9.8

SQL Injection vulnerability in Dolibarr before version 7.0.2 allows remote attackers to execute arbitrary SQL commands via the sortfield parameter to /accountancy/admin/accountmodel.php, /accountancy/admin/categories_list.php, /accountancy/admin/journals_list.php, /admin/dict.php, /admin/mails_templates.php, or /admin/website.php.

dolibarr / dolibarr+3
Network
Published May 22, 2018
CVE-2019-19212
CRITICAL9.8

Dolibarr ERP/CRM 3.0 through 10.0.3 allows XSS via the qty parameter to product/fournisseurs.php (product price screen).

dolibarr / dolibarr
Network
Published Mar 16, 2020
CVE-2018-10094
CRITICAL9.8

SQL injection vulnerability in Dolibarr before 7.0.2 allows remote attackers to execute arbitrary SQL commands via vectors involving integer parameters without quotes.

dolibarr / dolibarr
Network
Published May 22, 2018
CVE-2021-25955
CRITICAL9.0

In “Dolibarr ERP CRM”, WYSIWYG Editor module, v2.8.1 to v13.0.2 are affected by a stored XSS vulnerability that allows low privileged application users to store malicious scripts in the “Private Note” field at “/adherents/note.php?id=1” endpoint. These scripts are executed in a victim’s browser when they open the page containing the vulnerable field. In the worst case, the victim who inadvertently triggers the attack is a highly privileged administrator. The injected scripts can extract the Session ID, which can lead to full Account takeover of the admin and due to other vulnerability (Improper Access Control on Private notes) a low privileged user can update the private notes which could lead to privilege escalation.

dolibarr / dolibarr
Network
Published Aug 15, 2021
CVE-2020-12669
HIGH8.8

core/get_menudiv.php in Dolibarr before 11.0.4 allows remote authenticated attackers to bypass intended access restrictions via a non-alphanumeric menu parameter.

dolibarr / dolibarr
Network
Published May 6, 2020
CVE-2021-25957
HIGH8.8

In “Dolibarr” application, v2.8.1 to v13.0.2 are vulnerable to account takeover via password reset functionality. A low privileged attacker can reset the password of any user in the application using the password reset link the user received through email when requested for a forgotten password.

dolibarr / dolibarr
Network
Published Aug 17, 2021
CVE-2020-14209
HIGH8.8

Dolibarr before 11.0.5 allows low-privilege users to upload files of dangerous types, leading to arbitrary code execution. This occurs because .pht and .phar files can be uploaded. Also, a .htaccess file can be uploaded to reconfigure access control (e.g., to let .noexe files be executed as PHP code to defeat the .noexe protection mechanism).

dolibarr / dolibarr
Network
Published Sep 2, 2020
CVE-2020-14443
HIGH8.8

A SQL injection vulnerability in accountancy/customer/card.php in Dolibarr 11.0.3 allows remote authenticated users to execute arbitrary SQL commands via the id parameter.

dolibarr / dolibarr
Network
Published Jun 18, 2020
CVE-2018-10092
HIGH8.0

The admin panel in Dolibarr before 7.0.2 might allow remote attackers to execute arbitrary commands by leveraging support for updating the antivirus command and parameters used to scan file uploads.

dolibarr / dolibarr
Network
Published May 22, 2018
CVE-2019-19209
HIGH7.5

Dolibarr ERP/CRM before 10.0.3 allows SQL Injection.

dolibarr / dolibarr
Network
Published Mar 16, 2020
CVE-2020-14201
MEDIUM6.5

Dolibarr CRM before 11.0.5 allows privilege escalation. This could allow remote authenticated attackers to upload arbitrary files via societe/document.php in which "disabled" is changed to "enabled" in the HTML source code.

dolibarr / dolibarr
Network
Published Aug 21, 2020
CVE-2018-10095
MEDIUM6.1

Cross-site scripting (XSS) vulnerability in Dolibarr before 7.0.2 allows remote attackers to inject arbitrary web script or HTML via the foruserlogin parameter to adherents/cartes/carte.php.

dolibarr / dolibarr
Network
Published May 22, 2018
CVE-2019-19211
MEDIUM6.1

Dolibarr ERP/CRM before 10.0.3 has an Insufficient Filtering issue that can lead to user/card.php XSS.

dolibarr / dolibarr
Network
Published Mar 16, 2020
CVE-2018-19799
MEDIUM6.1

Dolibarr ERP/CRM through 8.0.3 has /exports/export.php?datatoexport= XSS.

dolibarr / dolibarr
Network
Published Dec 26, 2018
CVE-2018-16808
MEDIUM6.1

An issue was discovered in Dolibarr through 7.0.0. There is Stored XSS in expensereport/card.php in the expense reports plugin via the comments parameter, or a public or private note.

dolibarr / dolibarr
Network
Published Mar 7, 2019
CVE-2021-42220
MEDIUM5.4

A Cross Site Scripting (XSS) vulnerability exists in Dolibarr before 14.0.3 via the ticket creation flow. Exploitation requires that an admin copies the payload into a box.

dolibarr / dolibarr
Network
Published Dec 15, 2021
CVE-2020-13094
MEDIUM5.4

Dolibarr before 11.0.4 allows XSS.

dolibarr / dolibarr
Network
Published May 18, 2020
CVE-2019-19210
MEDIUM5.4

Dolibarr ERP/CRM before 10.0.3 allows XSS because uploaded HTML documents are served as text/html despite being renamed to .noexe files.

dolibarr / dolibarr
Network
Published Mar 16, 2020
CVE-2021-25956
MEDIUM4.7

In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overwritten for the victim user having a similar login name.

dolibarr / dolibarr+2
Network
Published Aug 17, 2021