Home

Description

Dolibarr ERP/CRM 10.0.1 contains multiple SQL injection vulnerabilities that allow authenticated attackers to manipulate database queries by injecting SQL code through POST parameters. Attackers can inject malicious SQL through parameters like actioncode, demand_reason_id, and availability_id in card.php endpoints to extract sensitive database information using boolean-based blind, error-based, and time-based blind techniques.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-22 | Updated 2026-02-22 | Assigner VulnCheck




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 7.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

10.0.1
affected

Credits

Metin Yunus Kandemir (kandemir) finder

References

www.exploit-db.com/exploits/47370 (ExploitDB-47370) exploit

www.vulncheck.com/...libarr-erpcrm-sql-injection-via-cardphp (VulnCheck Advisory: Dolibarr ERP/CRM 10.0.1 SQL Injection via card.php) third-party-advisory

cve.org (CVE-2019-25450)

nvd.nist.gov (CVE-2019-25450)

Download JSON