Platform
php
Component
dolibarr/dolibarr
Fixed in
15.0.1
15.0.1
CVE-2022-0819 is a critical vulnerability affecting Dolibarr versions 9.0.4 and earlier. This flaw allows attackers to inject arbitrary PHP code and execute commands on the server's file system, potentially leading to complete system compromise. The vulnerability resides in the 'dol_eval' function within Dolibarr's core library. A fix is available in version 15.0.1.
The impact of CVE-2022-0819 is severe. Successful exploitation allows an attacker to execute arbitrary code with the privileges of the web server user. This could lead to data breaches, modification of sensitive data, installation of malware, and complete control over the affected Dolibarr instance. An attacker could potentially gain access to customer data, financial records, and other confidential information stored within the system. The ability to execute commands on the file system also opens the door for lateral movement within the network, if the Dolibarr server has access to other systems.
CVE-2022-0819 was publicly disclosed on March 3, 2022. While no active exploitation campaigns have been definitively confirmed, the ease of exploitation and the potential impact make it a high-priority vulnerability. Public proof-of-concept code is likely to emerge, increasing the risk of exploitation. This vulnerability is not currently listed on the CISA KEV catalog.
Exploit Status
EPSS
1.74% (82% percentile)
CVSS Vector
The primary mitigation for CVE-2022-0819 is to upgrade Dolibarr to version 15.0.1 or later. If an immediate upgrade is not possible, consider implementing temporary workarounds. While a direct WAF rule is difficult due to the code injection nature, strict input validation on any user-supplied data used in the 'doleval' function is crucial. Review and restrict the allowed functions within the 'doleval' function to only those absolutely necessary. Monitor Dolibarr logs for unusual PHP execution patterns. After upgrading, confirm the fix by attempting to trigger the vulnerable 'dol_eval' function with malicious input; it should now be properly sanitized.
Update Dolibarr to version 15.0.1 or higher. This version fixes the code injection vulnerability. It is recommended to make a backup before updating.
Vulnerability analysis and critical alerts directly to your inbox.
CVE-2022-0819 is a HIGH severity vulnerability in Dolibarr versions up to 9.0.4 that allows attackers to inject and execute arbitrary PHP code, potentially leading to full system compromise.
If you are running Dolibarr version 9.0.4 or earlier, you are vulnerable to this code injection flaw. Immediate action is required.
Upgrade Dolibarr to version 15.0.1 or later to resolve this vulnerability. If upgrading is not immediately possible, implement strict input validation and restrict allowed functions.
While no confirmed active exploitation campaigns are publicly known, the ease of exploitation makes it a high-risk vulnerability. Proactive patching is essential.
Refer to the official Dolibarr security advisory for detailed information and updates: [https://www.dolibarr.org/security/dolibarr-security-advisories/](https://www.dolibarr.org/security/dolibarr-security-advisories/)
Upload your dependency file and we'll tell you instantly if this and other CVEs hit you.