[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2018-25357":6},{"stargazers_count":4,"fetched_at":5},6,"2026-05-24T14:57:35.500Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":62,"aliases":77,"duplicate_of":9,"upstream":78,"downstream":79,"duplicates":80,"related":81,"reserved_at":9,"published_at":82,"modified_at":82,"state":83,"summary":84,"references_raw":92,"kevs":111,"epss":112,"epss_history":115,"metrics":117,"affected":125},"CVE-2018-25357","Dolibarr ERP CRM 7.0.3 contains a remote code evaluation vulnerability that allows unauthenticated attackers to execute arbitrary code by injecting PHP code through the db_name parameter. Attackers can send a POST request to install/step1.php with malicious PHP code in the db_name parameter, then execute commands via the check.php endpoint using the cmd GET parameter.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-94","Improper Control of Generation of Code ('Code Injection')","The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.","weakness","Draft","Base","Medium",[20,24,58],{"id":21,"name":22,"techniques":23},"CAPEC-242","Code Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-35","Leverage Executable Code in Non-Executable Files",[28,39,46],{"id":29,"name":30,"tactics":31,"countermeasures":38},"T1027.006","HTML Smuggling",[32,35],{"id":33,"name":34},"TA0030","Defense Evasion",{"id":36,"name":37},"TA0005","Stealth",[],{"id":40,"name":41,"tactics":42,"countermeasures":45},"T1027.009","Embedded Payloads",[43,44],{"id":33,"name":34},{"id":36,"name":37},[],{"id":47,"name":48,"tactics":49,"countermeasures":52},"T1564.009","Resource Forking",[50,51],{"id":33,"name":34},{"id":36,"name":37},[53],{"id":54,"name":55,"tactic":56},"D3-FFV","File Format Verification",{"name":57},"Isolate",{"id":59,"name":60,"techniques":61},"CAPEC-77","Manipulating User-Controlled Variables",[],[63],{"_key":64,"name":65,"source":66,"url":67,"maturity":68,"reliability_score":69,"verified":70,"type":9,"platforms":71,"requires_auth":9,"exploitdb":73,"metasploit":9},"44964","Dolibarr ERP/CRM \u003C 7.0.3 - PHP Code Injection","exploit-database","https://www.exploit-db.com/exploits/44964","poc",0.5,false,[72],"php",{"verified":70,"type":74,"platform":72,"file":75,"codes":76},"webapps","exploits/php/webapps/44964.txt",[],[],[],[],[],[],"2026-05-23T18:32:14.169Z","PUBLISHED",{"cisa_kev":70,"cisa_ransomware":70,"cisa_vendor":9,"epss_severity":85,"epss_score":86,"severity":87,"severity_score":88,"severity_version":89,"severity_source":90,"severity_vector":91,"severity_status":83},"low",0.00156,"critical",9.8,"v3.1","cve.org","CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",[93,97,102,106],{"url":67,"sources":94,"tags":95},[90],[96],"Exploit",{"url":98,"sources":99,"tags":100},"https://dolibarr.org",[90],[101],"Product",{"url":103,"sources":104,"tags":105},"https://github.com/Dolibarr/dolibarr",[90],[101],{"url":107,"sources":108,"tags":109},"https://www.vulncheck.com/advisories/dolibarr-erp-crm-remote-code-evaluation-via-install-step1-php",[90],[110],"Third Party Advisory",[],{"date":113,"score":86,"percentile":114},"2026-05-24",0.35881,[116],{"date":113,"score":86,"percentile":114},[118],{"source":90,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":119,"cvss_v4_0":122},{"baseScore":88,"baseSeverity":120,"vectorString":91,"impactScore":88,"exploitabilityScore":121},"CRITICAL",10,{"baseScore":123,"baseSeverity":120,"vectorString":124,"impactScore":9,"exploitabilityScore":9},9.3,"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",[126],{"ecosystem":9,"name":127,"vendor":128,"product":129,"cpe_part":130,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":131},"Dolibarr ERP CRM","dolibarr","dolibarr erp crm","a",[132],{"version":133,"is_range":134,"range_type":90,"version_start":9,"version_start_type":9,"version_end":135,"version_end_type":136,"fixed_in":9},"\u003C= 7.0.3",true,"7.0.3","including"]