Home

Description

Dolibarr ERP/CRM 10.0.1 contains an SQL injection vulnerability in the elemid POST parameter of the viewcat.php endpoint that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted POST requests with malicious SQL payloads in the elemid parameter to extract sensitive database information using error-based or time-based blind SQL injection techniques.

PUBLISHED Reserved 2026-02-20 | Published 2026-02-22 | Updated 2026-02-22 | Assigner VulnCheck




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N
HIGH: 8.2CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Problem types

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

10.0.1
affected

Credits

Metin Yunus Kandemir (kandemir) finder

References

www.exploit-db.com/exploits/47362 (ExploitDB-47362) exploit

www.vulncheck.com/...olibarr-erpcrm-sql-injection-via-elemid (VulnCheck Advisory: Dolibarr ERP/CRM 10.0.1 SQL Injection via elemid) third-party-advisory

cve.org (CVE-2019-25452)

nvd.nist.gov (CVE-2019-25452)

Download JSON