TopVuln

High-risk vulnerability digests

CVE-2026-23500

  • CRITICAL

security-advisories@github.com

Details

CVSS v3
9.1
CVSS v4
9.4
NVD published
2026-04-17 21:16:31
Affected versions
cpe:2.3:a:dolibarr:dolibarr_erp\/crm:*:*:*:*:*:*:*:*
Summary
Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions prior to 23.0.0 , the ODT to PDF conversion process in odf.php concatenates the MAIN_ODT_AS_PDF configuration constant directly into a shell command passed to exec() without sanitization. An authenticated administrator can inject arbitrary OS commands via this constant using command separators, achieving remote code execution as the web server user when any ODT template is generated. This issue has been fixed in version 23.0.0.
Remediation
Not available in our cache.
Exploit info
https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-w5j3-8fcr-h87w

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.