Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-w5j3-8fcr-h87w | Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_PDF configuration |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 18 Apr 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 17 Apr 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dolibarr
Dolibarr dolibarr |
|
| Vendors & Products |
Dolibarr
Dolibarr dolibarr |
Fri, 17 Apr 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions prior to 23.0.0 , the ODT to PDF conversion process in odf.php concatenates the MAIN_ODT_AS_PDF configuration constant directly into a shell command passed to exec() without sanitization. An authenticated administrator can inject arbitrary OS commands via this constant using command separators, achieving remote code execution as the web server user when any ODT template is generated. This issue has been fixed in version 23.0.0. | |
| Title | Dolibarr: OS Command Injection (RCE) via MAIN_ODT_AS_PDF configuration | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-18T03:06:20.406Z
Reserved: 2026-01-13T15:47:41.630Z
Link: CVE-2026-23500
Updated: 2026-04-18T03:06:16.004Z
Status : Received
Published: 2026-04-17T21:16:31.890
Modified: 2026-04-17T21:16:31.890
Link: CVE-2026-23500
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:30:28Z
Github GHSA