CVE-2020-11825: Dolibarr Cross-Site Request Forgery Vulnerability
8.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.37357%
CWE
Published
5/24/2022
Updated
7/17/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
dolibarr/dolibarr | composer | <= 10.0.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability description indicates that CSRF tokens were not properly scoped to individual user sessions, allowing cross-session reuse. This suggests flaws in either the token generation/validation
logic or session binding mechanisms. However, without access to the specific codebase, commit diffs, or patch details, it's impossible to identify exact function
names and file paths with high confidence. The root cause likely resides in functions
handling CSRF token storage/retrieval (e.g., token generation without session-specific entropy, or validation
that checks token existence globally rather than per-session), but insufficient public implementation details prevent precise identification.