High (8.2)

CVE-2019-25710: Dolibarr ERP-CRM SQLi - Patch Guide

CVE-2019-25710

Dolibarr ERP-CRM 8.0.4 contains an SQL injection vulnerability in the rowid parameter of the admin dict.php endpoint that allows attackers to execute arbitrary SQL queries. Attackers can inject malici...

Overview

CVE-2019-25710 is a high-severity SQL injection vulnerability in Dolibarr ERP-CRM version 8.0.4. The flaw resides in the rowid parameter of the admin/dict.php endpoint. Attackers can exploit this by sending specially crafted POST requests containing malicious SQL code, leveraging error-based techniques to extract sensitive information directly from the application’s database.

Technical Details

The vulnerability has a CVSS score of 8.2. Its vector details indicate a significant threat: it is network-exploitable (Attack Vector: NETWORK), requires no special conditions to exploit (Attack Complexity: LOW), needs no privileges (Privileges Required: NONE), and requires no action from a user (User Interaction: NONE). This combination means an unauthenticated remote attacker can target the application directly.

The specific attack vector is the rowid POST parameter. By injecting SQL commands, an attacker can manipulate database queries executed by the admin/dict.php script. Successful exploitation could lead to the full compromise of database confidentiality, allowing access to sensitive business data, user credentials, or other proprietary information stored within the Dolibarr system.

Impact

If exploited, this vulnerability allows attackers to execute arbitrary SQL queries. The primary impact is a severe data breach, where sensitive information such as customer details, financial records, employee data, and system credentials can be extracted. This could lead to operational disruption, financial loss, and non-compliance with data protection regulations. While not listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, the high CVSS score and ease of exploitation make it a significant potential risk that warrants immediate attention.

Remediation and Mitigation

The primary remediation is to upgrade Dolibarr ERP-CRM to a patched version. Users of version 8.0.4 should consult the official Dolibarr security advisories and apply the relevant update immediately. If an immediate upgrade is not possible, consider the following mitigation steps:

  • Restrict network access to the Dolibarr administration interface to trusted IP addresses only.
  • Implement a Web Application Firewall (WAF) with rules configured to block SQL injection patterns.
  • Conduct a thorough review of application logs for any suspicious POST requests to the admin/dict.php endpoint containing unusual rowid parameter values.

For more information on the consequences of data exposure, you can review recent incidents in our breach reports.

Security Insight

This vulnerability highlights a persistent challenge in web application security: the failure to properly sanitize user input in administrative functions. Similar to past SQLi flaws in other ERP systems, CVE-2019-25710 underscores that even core administrative modules are not immune to basic injection flaws. It serves as a reminder that continuous security testing, including on authentication-backed endpoints, is critical for comprehensive application protection. Stay informed on evolving application threats through our security news.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.