Home

Description

A vulnerability was identified in Dolibarr ERP CRM up to 23.0.2. This affects the function _checkValForAPI of the file htdocs/expedition/class/expedition.class.php of the component Shipments API Endpoint. The manipulation of the argument fields leads to sql injection. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

PUBLISHED Reserved 2026-05-02 | Published 2026-05-03 | Updated 2026-05-05 | Assigner VulDB




LOW: 2.3CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
MEDIUM: 5.0CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
MEDIUM: 5.0CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R
4.6AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR

Problem types

SQL Injection

Injection

Product status

23.0.0
affected

23.0.1
affected

23.0.2
affected

Timeline

2026-05-02:Advisory disclosed
2026-05-02:VulDB entry created
2026-05-02:VulDB entry last update

Credits

Chris Oakley finder

chris00 (VulDB User) reporter

chris00 (VulDB User) analyst

VulDB CNA Team coordinator

References

vuldb.com/submit/799337 exploit

vuldb.com/vuln/360858 (VDB-360858 | Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection) vdb-entry technical-description

vuldb.com/vuln/360858/cti (VDB-360858 | CTI Indicators (IOB, IOC, TTP, IOA)) signature permissions-required

vuldb.com/submit/799337 (Submit #799337 | Dolibarr Dolibarr ERP CRM 23.0.2 and earlier SQL Injection) third-party-advisory

cve.org (CVE-2026-7688)

nvd.nist.gov (CVE-2026-7688)

Download JSON