Cyber Posture

CVE-2026-31019

HighRCE

Published: 21 April 2026

Published
21 April 2026
Modified
23 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0010 27.8th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-31019 is a high-severity OS Command Injection (CWE-78) vulnerability in Dolibarr Dolibarr Erp\/Crm. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 27.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Mandates validation of PHP content inputs in the Website module to prevent bypass of blacklist filtering and block dangerous functions enabling OS command injection.

prevent

Requires timely identification, reporting, and correction of the specific flaw in Dolibarr's blacklist-based filtering, preventing RCE exploitation via patching.

prevent

Enforces least privilege to restrict PHP content editing permissions, mitigating risk from low-privileged authenticated users exploiting the vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Vulnerability in public-facing web app (Dolibarr Website module) enables low-priv authenticated RCE via OS command injection by bypassing PHP function blacklist, directly mapping to T1190 (exploit public-facing app), T1068 (exploitation for priv esc), and T1059.004 (Unix Shell execution).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering,…

more

resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.

Deeper analysisAI

CVE-2026-31019 is a vulnerability in the Website module of Dolibarr ERP & CRM versions 22.0.4 and below. The issue arises from blacklist-based filtering designed to block dangerous PHP functions associated with system command execution. An authenticated user with permission to edit PHP content can bypass this filtering mechanism, resulting in full remote code execution (RCE) that allows arbitrary operating system commands on the server. The vulnerability is classified under CWE-78 (OS Command Injection) with a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

Exploitation requires an authenticated attacker possessing low privileges, specifically permission to edit PHP content. The attack vector is network-based with low attack complexity and no user interaction needed. Upon success, the attacker achieves high impacts across confidentiality, integrity, and availability, enabling complete server compromise through arbitrary command execution.

Mitigation details are available in advisories referenced at http://dolibarr.com and https://github.com/PhDg1410/CVE/blob/main/CVE-2026-31019/README.md. The vulnerability was published on 2026-04-21.

Details

CWE(s)

Affected Products

dolibarr
dolibarr erp\/crm
≤ 22.0.4

CVEs Like This One

CVE-2026-23500Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-31018Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2019-25450Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2019-25710Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2019-25452Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2026-22666Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2024-55227Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2025-56588Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2024-55228Same product: Dolibarr Dolibarr Erp\/Crm
CVE-2025-56102Shared CWE-78

References