Cyber Posture

CVE-2019-25452

HighPublic PoC

Published: 22 February 2026

Published
22 February 2026
Modified
02 March 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0013 32.0th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2019-25452 is a high-severity SQL Injection (CWE-89) vulnerability in Dolibarr Dolibarr Erp\/Crm. Its CVSS base score is 7.5 (High).

Operationally, ranked at the 32.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

NVD Description

Dolibarr ERP/CRM 10.0.1 contains an SQL injection vulnerability in the elemid POST parameter of the viewcat.php endpoint that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted POST requests with malicious SQL payloads in the elemid parameter…

more

to extract sensitive database information using error-based or time-based blind SQL injection techniques.

Deeper analysisAI

CVE-2019-25452 is an SQL injection vulnerability (CWE-89) in Dolibarr ERP/CRM version 10.0.1. The issue affects the "elemid" POST parameter in the viewcat.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries via crafted POST requests containing malicious SQL payloads.

Unauthenticated attackers can exploit this vulnerability remotely with low complexity, requiring no privileges or user interaction. Successful exploitation enables extraction of sensitive database information using error-based or time-based blind SQL injection techniques. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact without affecting integrity or availability.

Advisories and references, including those from Vulncheck (https://www.vulncheck.com/advisories/dolibarr-erpcrm-sql-injection-via-elemid) and Exploit-DB (https://www.exploit-db.com/exploits/47362), provide additional details on the vulnerability, such as proof-of-concept exploits.

A proof-of-concept exploit is publicly available on Exploit-DB, indicating potential for real-world exploitation. The CVE was published on 2026-02-22.

Details

CWE(s)

Affected Products

dolibarr
dolibarr erp\/crm
10.0.1

CVEs Like This One

CVE-2019-25710Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2019-25450Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2024-55227Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-31019Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2025-56588Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2024-55228Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-22666Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-23500Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-31018Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-2094Shared CWE-89

References