CVE-2019-25450

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker who is already logged into the Dolibarr ERP/CRM system to manipulate database queries and extract sensitive information by sending specially crafted data through specific web form fields. If exploited, the attacker can use various techniques to retrieve private data from the database without needing direct access to it.

Technical Description

Dolibarr ERP/CRM 10.0.1 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries by injecting SQL code through POST parameters. Attackers can inject malicious SQL through parameters like actioncode, demand_reason_id, and availability_id in card.php endpoints to extract sensitive database information using boolean-based blind, error-based, and time-based blind techniques.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,211($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Feb 22, 2026

about 1 month ago

Last Modified

Feb 25, 2026

about 1 month ago

Vendor

dolibarr

Product

dolibarr erp\/crm