CVE-2026-31018
Published: 21 April 2026
Summary
CVE-2026-31018 is a high-severity Code Injection (CWE-94) vulnerability in Dolibarr Dolibarr Erp\/Crm. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 12.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates all inputs in the Website module to detect and reject PHP code injections from restricted users.
Enforces consistent access permissions across all input parameters during website page creation to block unauthorized PHP injection.
Ensures authenticated users restricted to HTML/JavaScript editing lack privileges for PHP code execution or injection.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
PHP code injection in public-facing web module (Website) allows authenticated low-priv users to achieve RCE, directly enabling exploitation of public apps (T1190), privilege escalation from restricted editor role (T1068), and web shell deployment (T1100).
NVD Description
In Dolibarr ERP & CRM <= 22.0.4, PHP code detection and editing permission enforcement in the Website module is not applied consistently to all input parameters, allowing an authenticated user restricted to HTML/JavaScript editing to inject PHP code through unprotected…
more
inputs during website page creation.
Deeper analysisAI
CVE-2026-31018 affects Dolibarr ERP & CRM versions 22.0.4 and earlier, specifically within the Website module. The vulnerability stems from inconsistent PHP code detection and editing permission enforcement across input parameters. This flaw enables an authenticated user, restricted to HTML/JavaScript editing, to inject PHP code through unprotected inputs during website page creation. It is rated 8.8 severity under CVSS 3.1 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) and maps to CWE-94 (Code Injection) and CWE-284 (Improper Access Control). The issue was published on 2026-04-21.
An attacker requires low-privilege authenticated access (PR:L) to exploit this remotely over the network (AV:N) with low complexity and no user interaction. By bypassing restrictions during page creation, they can inject and execute arbitrary PHP code, potentially leading to high-impact confidentiality, integrity, and availability compromises, such as data theft, modification, or denial of service on the affected system.
Advisories and further details are available from official sources including the Dolibarr website at http://dolibarr.com and a GitHub repository at https://github.com/PhDg1410/CVE/blob/main/CVE-2026-31018/README.md, which security practitioners should consult for patch information and mitigation guidance.
Details
- CWE(s)