| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| dolibarr/dolibarr | composer | <= 11.0.0 |
The vulnerability stems from missing output encoding in four key areas: 1) list.php directly outputs user-controlled sall/search_all parameters. 2) mails_templates.php inserts unsanitized joinfiles parameter values into HTML attributes. 3) card.php stores and displays untrusted address input. 4) document.php reflects file parameter without sanitization. All locations match the advisory's vectors (joinfiles, topic/code via similar patterns, Referer via analogous header handling) and demonstrate clear lack of context-aware escaping required for XSS prevention.
KEV Misses 88% of Exploited CVEs- Get the report