CVE-2019-25710: Dolibarr ERP-CRM SQLi - Patch Guide
CVE-2019-25710
Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malici...
Overview
CVE-2019-25710 is a high-severity SQL injection vulnerability in Dolibarr ERP-CRM version 8.0.4. The flaw resides in the rowid parameter of the admin/dict.php endpoint. Attackers can exploit this by sending specially crafted POST requests containing malicious SQL code, leveraging error-based techniques to extract sensitive information directly from the application’s database.
Technical Details
The vulnerability has a CVSS score of 8.2. Its vector details indicate a significant threat: it is network-exploitable (Attack Vector: NETWORK), requires no special conditions to exploit (Attack Complexity: LOW), needs no privileges (Privileges Required: NONE), and requires no action from a user (User Interaction: NONE). This combination means an unauthenticated remote attacker can target the application directly.
The specific attack vector is the rowid POST parameter. By injecting SQL commands, an attacker can manipulate database queries executed by the admin/dict.php script. Successful exploitation could lead to the full compromise of database confidentiality, allowing access to sensitive business data, user credentials, or other proprietary information stored within the Dolibarr system.
Impact
If exploited, this vulnerability allows attackers to execute arbitrary SQL queries. The primary impact is a severe data breach, where sensitive information such as customer details, financial records, employee data, and system credentials can be extracted. This could lead to operational disruption, financial loss, and non-compliance with data protection regulations. While not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the high CVSS score and ease of exploitation make it a significant potential risk that warrants immediate attention.
Remediation and Mitigation
The primary remediation is to upgrade Dolibarr ERP-CRM to a patched version. Users of version 8.0.4 should consult the official Dolibarr security advisories and apply the relevant update immediately. If an immediate upgrade is not possible, consider the following mitigation steps:
- Restrict network access to the Dolibarr administration interface to trusted IP addresses only.
- Implement a Web Application Firewall (WAF) with rules configured to block SQL injection patterns.
- Conduct a thorough review of application logs for any suspicious POST requests to the
admin/dict.phpendpoint containing unusualrowidparameter values.
For more information on the consequences of data exposure, you can review recent incidents in our breach reports.
Security Insight
This vulnerability highlights a persistent challenge in web application security: the failure to properly sanitize user input in administrative functions. Similar to past SQLi flaws in other ERP systems, CVE-2019-25710 underscores that even core administrative modules are not immune to basic injection flaws. It serves as a reminder that continuous security testing, including on authentication-backed endpoints, is critical for comprehensive application protection. Stay informed on evolving application threats through our security news.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the cat_id parameter. Attackers can send GET requ...
News Website Script 2.0.5 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the news ID parameter. Attackers ca...
CMSsite 1.0 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'post' parameter. Attackers can send GET requ...
eDirectory contains multiple SQL injection vulnerabilities that allow unauthenticated attackers to bypass administrator authentication and disclose sensitive files by injecting SQL code into parameter...