-
CVSS Score
-The vulnerability stems from direct interpolation of user-controlled parameters into SQL queries in comm/propal/list.php. Both advisories explicitly identify: 1) viewstatut parameter vulnerable through 7.0.0 2) propal_statut (renamed to search_statut) vulnerable in the same file. The Wizlynx report demonstrates SQLi via these parameters through error-based and time-based injection techniques. While exact function names aren't provided, the main list.php processing logic handling these parameters constitutes the vulnerable code path. High confidence comes from multiple independent sources confirming the vulnerable parameters and attack vectors.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dolibarr/dolibarr | composer | <= 7.0.0 |
A Semantic Attack on Google Gemini - Read the Latest Research