<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2019-25710 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2019-25710/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 12 Apr 2026 13:16:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2019-25710/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</guid><description>Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Dolibarr ERP-CRM is a popular open-source enterprise resource planning and customer relationship management software. Version 8.0.4 of Dolibarr is susceptible to a critical SQL injection vulnerability (CVE-2019-25710) affecting the <code>rowid</code> parameter in the <code>admin dict.php</code> endpoint. This flaw allows unauthenticated attackers to inject malicious SQL code through the <code>rowid</code> POST parameter. Successful exploitation enables attackers to execute arbitrary SQL queries against the Dolibarr database, potentially leading to the exposure of sensitive information, modification of data, or complete compromise of the application. This vulnerability can be exploited using error-based SQL injection techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Dolibarr ERP-CRM instance running version 8.0.4.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>admin/dict.php</code> endpoint.</li>
<li>The request includes the <code>rowid</code> parameter containing a SQL injection payload.</li>
<li>The server-side application processes the request and executes the injected SQL code within the database query.</li>
<li>The attacker leverages error-based SQL injection techniques to extract sensitive information from the database, such as user credentials, API keys, or financial data.</li>
<li>The attacker analyzes the error messages returned by the application to refine the SQL injection payload and bypass any security measures.</li>
<li>The attacker potentially uses the extracted credentials to gain unauthorized access to other parts of the application or the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to severe consequences, including unauthorized access to sensitive data, data breaches, and complete compromise of the Dolibarr ERP-CRM system. The vulnerability allows attackers to extract sensitive database information, modify data, or potentially execute arbitrary code on the server. Given that ERP and CRM systems often contain critical business data, the impact can be significant for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of Dolibarr ERP-CRM to remediate CVE-2019-25710.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Dolibarr rowid Parameter SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts against the <code>admin/dict.php</code> endpoint.</li>
<li>Monitor web server logs for unusual POST requests to <code>admin/dict.php</code> with suspicious characters or SQL keywords in the <code>rowid</code> parameter to detect potential attacks.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious SQL injection payloads targeting the <code>rowid</code> parameter in <code>admin/dict.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25710</category><category>dolibarr</category><category>web-application</category></item></channel></rss>