A vulnerability was identified in Dolibarr ERP CRM up to 23.0.2. This affects the function _checkValForAPI of the file htdocs/expedition/class/expedition.class.php of the component Shipments API Endpoint. The manipulation of the argument fields leads to sql injection. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.
PUBLISHED5.2CWE-89CWE-74x_open-source
Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection
Problem type
Affected products
Dolibarr
ERP CRM
23.0.0 - AFFECTED
23.0.1 - AFFECTED
23.0.2 - AFFECTED
References
VDB-360858 | Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection
https://vuldb.com/vuln/360858
VDB-360858 | CTI Indicators (IOB, IOC, TTP, IOA)
https://vuldb.com/vuln/360858/cti
Submit #799337 | Dolibarr Dolibarr ERP CRM 23.0.2 and earlier SQL Injection
https://vuldb.com/submit/799337
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7688Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7688",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-05-03T09:15:11.998Z",
"dateReserved": "2026-05-02T16:27:22.949Z",
"datePublished": "2026-05-03T09:15:11.998Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-05-03T09:15:11.998Z"
},
"title": "Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was identified in Dolibarr ERP CRM up to 23.0.2. This affects the function _checkValForAPI of the file htdocs/expedition/class/expedition.class.php of the component Shipments API Endpoint. The manipulation of the argument fields leads to sql injection. The attack is possible to be carried out remotely. A high degree of complexity is needed for the attack. It is indicated that the exploitability is difficult. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "Dolibarr",
"product": "ERP CRM",
"modules": [
"Shipments API Endpoint"
],
"versions": [
{
"version": "23.0.0",
"status": "affected"
},
{
"version": "23.0.1",
"status": "affected"
},
{
"version": "23.0.2",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "SQL Injection",
"cweId": "CWE-89",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Injection",
"cweId": "CWE-74",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/360858",
"name": "VDB-360858 | Dolibarr ERP CRM Shipments API Endpoint expedition.class.php _checkValForAPI sql injection",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/360858/cti",
"name": "VDB-360858 | CTI Indicators (IOB, IOC, TTP, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/799337",
"name": "Submit #799337 | Dolibarr Dolibarr ERP CRM 23.0.2 and earlier SQL Injection",
"tags": [
"third-party-advisory"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 5,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R",
"baseScore": 5,
"baseSeverity": "MEDIUM"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR",
"baseScore": 4.6
}
}
],
"timeline": [
{
"time": "2026-05-02T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-05-02T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-05-02T21:49:01.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "Chris Oakley",
"type": "finder"
},
{
"lang": "en",
"value": "chris00 (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "chris00 (VulDB User)",
"type": "analyst"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
],
"tags": [
"x_open-source"
]
}
}
}