CVE-2019-25452

Source: disclosure@vulncheck.com

HIGH
8.8
Published: February 22, 2026 at 02:16 PM
Modified: February 23, 2026 at 06:13 PM

Vulnerability Description

Dolibarr ERP/CRM 10.0.1 contains an SQL injection vulnerability in the elemid POST parameter of the viewcat.php endpoint that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted POST requests with malicious SQL payloads in the elemid parameter to extract sensitive database information using error-based or time-based blind SQL injection techniques.

CVSS Metrics

Base Score
8.8
Severity
HIGH
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: disclosure@vulncheck.com

AI Security Analysis

01 // Technical Summary

Unauthenticated attackers can exploit a critical SQL injection vulnerability in Dolibarr ERP/CRM 10.0.1, allowing them to execute arbitrary SQL queries and potentially gain unauthorized access to sensitive data. This vulnerability, located in the viewcat.php endpoint, poses a significant risk of data breaches and system compromise due to its ease of exploitation.

02 // Vulnerability Mechanism

Step 1: Target Identification: The attacker identifies a Dolibarr ERP/CRM 10.0.1 installation.

Step 2: Request Crafting: The attacker crafts a malicious POST request to the viewcat.php endpoint. This request includes a crafted SQL payload within the elemid POST parameter.

Step 3: Payload Delivery: The attacker submits the crafted POST request to the vulnerable endpoint.

Step 4: SQL Injection: The application processes the request, incorporating the attacker-supplied elemid value directly into an SQL query without proper sanitization.

Step 5: Query Execution: The database server executes the injected SQL query, which now includes the attacker's malicious payload.

Step 6: Data Extraction: Depending on the payload, the attacker can extract sensitive data using error-based or time-based blind SQL injection techniques.

Step 7: System Compromise (Potential): In more advanced attacks, the attacker could potentially escalate privileges, modify data, or gain remote code execution, depending on the database configuration and the complexity of the injected payload.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation of the elemid POST parameter in the viewcat.php endpoint. The application directly incorporates user-supplied data from this parameter into SQL queries without proper sanitization or escaping. This allows an attacker to inject malicious SQL code, manipulating the database queries to extract sensitive information, such as usernames, passwords, and other confidential data. The root cause is a lack of parameterized queries or prepared statements, which would have prevented the injection of malicious SQL code. The absence of input validation allows for the execution of arbitrary SQL commands, leading to data exfiltration or system compromise. The vulnerability is easily exploitable due to the unauthenticated nature of the attack and the direct use of user-controlled input in database queries.

04 // Exploitation Status

Public PoC. Exploits are readily available and easily adaptable. The vulnerability is likely **Actively exploited** in the wild.

05 // Threat Intelligence

While no specific APT groups are definitively linked to this CVE, the ease of exploitation makes it attractive to a wide range of attackers, including financially motivated cybercriminals and nation-state actors. The vulnerability's impact on data confidentiality and integrity makes it a high-priority target. CISA KEV status: Likely, given the ease of exploitation and potential impact.

06 // Detection & Hunting

  • Network Intrusion Detection Systems (NIDS) should be configured to detect suspicious POST requests to viewcat.php containing SQL injection payloads (e.g., common SQL keywords like SELECT, UNION, WHERE, etc., or time-based injection indicators).

  • Web Application Firewalls (WAFs) can be deployed to filter malicious requests, blocking SQL injection attempts based on signature-based or behavior-based detection.

  • Review web server access logs for suspicious activity, such as unusual POST requests to viewcat.php with large or unusual elemid parameter values.

  • Monitor database server logs for unusual query patterns or errors that might indicate SQL injection attempts.

  • Implement file integrity monitoring to detect any unauthorized changes to the viewcat.php file or related files.

07 // Remediation & Hardening

  • Upgrade to a patched version of Dolibarr ERP/CRM that addresses the SQL injection vulnerability. Consult the vendor's security advisories for specific patch versions.

  • Implement input validation and sanitization for all user-supplied data, especially the elemid parameter. This includes escaping special characters and using parameterized queries or prepared statements to prevent SQL injection.

  • Enforce the principle of least privilege for database users, limiting their access to only the necessary database objects and operations.

  • Regularly scan the application for vulnerabilities using automated vulnerability scanners.

  • Implement a Web Application Firewall (WAF) to filter malicious traffic and protect against SQL injection attacks.

  • Review and harden the web server configuration to minimize the attack surface.

  • Implement strong password policies and multi-factor authentication for all user accounts.

08 // Affected Products

Dolibarr ERP/CRM 10.0.1

09 // Discovered Proof of Concept Links

Advertisement