CVE-2018-19993: Dolibarr reflected cross-site scripting (XSS) vulnerability
6.1
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.5489%
CWE
Published
5/14/2022
Updated
4/24/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dolibarr/dolibarr | composer | < 8.0.4 | 8.0.4 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key patterns:
- Direct output of GETPOST('transphrase') without sanitization (missing 'alphanohtml' filter parameter in vulnerable versions)
- Passing GETPOST('transkey') to the translation system without HTML escaping
The patch adds 'alphanohtml' filtering to both GETPOST calls, confirming these were the injection points. The functions are clearly vulnerable as they directly incorporate user-controlled input into HTML output without proper neutralization, meeting CWE-79 criteria for reflected XSS.