CVE-2019-25452
Published: 22 February 2026
Summary
CVE-2019-25452 is a high-severity SQL Injection (CWE-89) vulnerability in Dolibarr Dolibarr Erp\/Crm. Its CVSS base score is 7.5 (High).
Operationally, ranked at the 32.0th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
NVD Description
Dolibarr ERP/CRM 10.0.1 contains an SQL injection vulnerability in the elemid POST parameter of the viewcat.php endpoint that allows unauthenticated attackers to execute arbitrary SQL queries. Attackers can submit crafted POST requests with malicious SQL payloads in the elemid parameter…
more
to extract sensitive database information using error-based or time-based blind SQL injection techniques.
Deeper analysisAI
CVE-2019-25452 is an SQL injection vulnerability (CWE-89) in Dolibarr ERP/CRM version 10.0.1. The issue affects the "elemid" POST parameter in the viewcat.php endpoint, allowing unauthenticated attackers to execute arbitrary SQL queries via crafted POST requests containing malicious SQL payloads.
Unauthenticated attackers can exploit this vulnerability remotely with low complexity, requiring no privileges or user interaction. Successful exploitation enables extraction of sensitive database information using error-based or time-based blind SQL injection techniques. The CVSS v3.1 base score is 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), reflecting high confidentiality impact without affecting integrity or availability.
Advisories and references, including those from Vulncheck (https://www.vulncheck.com/advisories/dolibarr-erpcrm-sql-injection-via-elemid) and Exploit-DB (https://www.exploit-db.com/exploits/47362), provide additional details on the vulnerability, such as proof-of-concept exploits.
A proof-of-concept exploit is publicly available on Exploit-DB, indicating potential for real-world exploitation. The CVE was published on 2026-02-22.
Details
- CWE(s)