CVE-2026-23500
🔴 Łataj teraz
W Dolibarr, w procesie konwersji ODT na PDF, można zdalnie wykonać kod przez wstrzyknięcie poleceń.
CVSS
9.1
EPSS
0.1%
Exploit
poc
Vendor
dolibarr
Opis źródłowy (NVD)
Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions prior to 23.0.0 , the ODT to PDF conversion process in odf.php concatenates the MAIN_ODT_AS_PDF configuration constant directly into a shell command passed to exec() without sanitization. An authenticated administrator can inject arbitrary OS commands via this constant using command separators, achieving remote code execution as the web server user when any ODT template is generated. This issue has been fixed in version 23.0.0.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.1 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.1% |
| Opublikowano (NVD) | 2026-04-17 21:16:31 UTC |
| Ostatnia modyfikacja (NVD) | 2026-05-01 18:28:29 UTC |
Referencje
- https://github.com/Dolibarr/dolibarr/releases/tag/23.0.0 (security-advisories@github.com) [Product, Release Notes]
- https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-w5j3-8fcr-h87w (security-advisories@github.com) [Exploit, Vendor Advisory]