Authenticated Remote Code Execution in Dolibarr ERP/CRM by Dolibarr
CVE-2026-22666
Key Information:
- Vendor
Dolibarr
- Status
- Vendor
- CVE Published:
- 7 April 2026
Badges
What is CVE-2026-22666?
Dolibarr ERP/CRM versions prior to 23.0.2 suffer from an authenticated remote code execution vulnerability in the dol_eval_standard() function. This flaw arises from inadequate string checks in whitelist mode and a failure to recognize PHP dynamic callable syntax. An attacker with administrator privileges can exploit this vulnerability by injecting malicious payloads through computed extrafields, enabling them to bypass validation checks and execute arbitrary commands using the eval() function. It is crucial for users of affected versions to update to the latest release to mitigate this security risk.
Affected Version(s)
Dolibarr ERP/CRM 0 < 23.0.2
Dolibarr ERP/CRM 6f425521b3e6f9f27eca05228e02093dbaa40dea
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V4
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
