Dolibarr user with permission to edit PHP content can bypass filtering to restrict dangerous PHP functions
High severity
GitHub Reviewed
Published
Apr 21, 2026
to the GitHub Advisory Database
•
Updated Apr 29, 2026
Description
Published by the National Vulnerability Database
Apr 21, 2026
Published to the GitHub Advisory Database
Apr 21, 2026
Last updated
Apr 29, 2026
Reviewed
Apr 29, 2026
In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.
References