<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dolibarr — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/dolibarr/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 18 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/dolibarr/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dolibarr OS Command Injection via MAIN_ODT_AS_PDF Configuration</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</link><pubDate>Sat, 18 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-rce/</guid><description>Dolibarr versions 22.0.4 and earlier are vulnerable to OS Command Injection via the MAIN_ODT_AS_PDF configuration, allowing an authenticated administrator to inject a malicious payload, leading to arbitrary operating system command execution.</description><content:encoded><![CDATA[<p>Dolibarr, a popular open-source ERP and CRM system, is susceptible to OS Command Injection (RCE) in versions up to 22.0.4. This vulnerability, identified as CVE-2026-23500, stems from insufficient validation of the <code>MAIN_ODT_AS_PDF</code> configuration setting. An attacker with administrative privileges can inject malicious commands into this setting, which are then executed by the server during ODT to PDF conversion processes. The vulnerability resides in <code>htdocs/includes/odtphp/odf.php</code>, where the application constructs a shell command using the unfiltered <code>MAIN_ODT_AS_PDF</code> value. Successful exploitation enables arbitrary command execution on the server, potentially leading to complete system compromise.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker gains administrative access to the Dolibarr instance, either through credential compromise or social engineering.</li>
<li>The attacker navigates to the &ldquo;Home -&gt; Setup -&gt; Other Setup&rdquo; section of the Dolibarr administration panel.</li>
<li>The attacker modifies the <code>MAIN_ODT_AS_PDF</code> configuration constant. The injected payload includes a command separator (<code>;</code>) followed by the malicious command. The example uses <code>jodconverter; echo &lt;base64_encoded_command&gt; | base64 -d | bash</code>.</li>
<li>The attacker navigates to the &ldquo;Commerce -&gt; New proposal&rdquo; section.</li>
<li>The attacker creates a new proposal in draft status and selects an ODT template.</li>
<li>The attacker clicks the &ldquo;Generate&rdquo; button, triggering the ODT to PDF conversion process.</li>
<li>The application executes the crafted shell command, resulting in command execution.</li>
<li>In the proof of concept, the attacker establishes a reverse shell connection to their specified IP address (172.26.0.1) and port (4445), gaining interactive shell access.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation allows an attacker with administrator privileges to execute arbitrary commands on the underlying server as the web server user. This can lead to the compromise of sensitive data, modification of application files, and potentially full system compromise. The observed impact includes the establishment of a reverse shell, granting the attacker complete control over the Dolibarr instance. This vulnerability affects Dolibarr installations up to version 22.0.4.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Dolibarr to a patched version beyond 22.0.4 to remediate CVE-2026-23500.</li>
<li>Monitor process creation events for commands executed with suspicious arguments in <code>MAIN_ODT_AS_PDF</code> by deploying the provided Sigma rules.</li>
<li>Monitor network connections to unusual external IP addresses originating from the web server, especially following events related to document generation. Block the C2 IP address <code>172.26.0.1</code> listed in the IOC table at the network perimeter.</li>
<li>Implement strict access controls and regularly audit administrator accounts to prevent unauthorized access to the Dolibarr configuration settings.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>command-injection</category><category>rce</category><category>dolibarr</category></item><item><title>Dolibarr ERP-CRM 8.0.4 SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</link><pubDate>Sun, 12 Apr 2026 13:16:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-dolibarr-sqli/</guid><description>Dolibarr ERP-CRM 8.0.4 is vulnerable to SQL injection via the rowid parameter in the admin dict.php endpoint, allowing attackers to execute arbitrary SQL queries and extract sensitive database information.</description><content:encoded><![CDATA[<p>Dolibarr ERP-CRM is a popular open-source enterprise resource planning and customer relationship management software. Version 8.0.4 of Dolibarr is susceptible to a critical SQL injection vulnerability (CVE-2019-25710) affecting the <code>rowid</code> parameter in the <code>admin dict.php</code> endpoint. This flaw allows unauthenticated attackers to inject malicious SQL code through the <code>rowid</code> POST parameter. Successful exploitation enables attackers to execute arbitrary SQL queries against the Dolibarr database, potentially leading to the exposure of sensitive information, modification of data, or complete compromise of the application. This vulnerability can be exploited using error-based SQL injection techniques.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable Dolibarr ERP-CRM instance running version 8.0.4.</li>
<li>The attacker crafts a malicious HTTP POST request targeting the <code>admin/dict.php</code> endpoint.</li>
<li>The request includes the <code>rowid</code> parameter containing a SQL injection payload.</li>
<li>The server-side application processes the request and executes the injected SQL code within the database query.</li>
<li>The attacker leverages error-based SQL injection techniques to extract sensitive information from the database, such as user credentials, API keys, or financial data.</li>
<li>The attacker analyzes the error messages returned by the application to refine the SQL injection payload and bypass any security measures.</li>
<li>The attacker potentially uses the extracted credentials to gain unauthorized access to other parts of the application or the underlying system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability can lead to severe consequences, including unauthorized access to sensitive data, data breaches, and complete compromise of the Dolibarr ERP-CRM system. The vulnerability allows attackers to extract sensitive database information, modify data, or potentially execute arbitrary code on the server. Given that ERP and CRM systems often contain critical business data, the impact can be significant for affected organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply patches or upgrade to a secure version of Dolibarr ERP-CRM to remediate CVE-2019-25710.</li>
<li>Deploy the Sigma rule <code>Detect Suspicious Dolibarr rowid Parameter SQL Injection Attempt</code> to your SIEM to identify potential exploitation attempts against the <code>admin/dict.php</code> endpoint.</li>
<li>Monitor web server logs for unusual POST requests to <code>admin/dict.php</code> with suspicious characters or SQL keywords in the <code>rowid</code> parameter to detect potential attacks.</li>
<li>Implement web application firewall (WAF) rules to filter out malicious SQL injection payloads targeting the <code>rowid</code> parameter in <code>admin/dict.php</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>cve-2019-25710</category><category>dolibarr</category><category>web-application</category></item></channel></rss>