A security flaw has been discovered in Dolibarr ERP CRM up to 23.0.2. This vulnerability affects the function dol_verifyHash in the library htdocs/core/lib/security.lib.php of the component Online Signature Module. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
PUBLISHED5.2CWE-347CWE-345x_open-source
Dolibarr ERP CRM Online Signature security.lib.php dol_verifyHash signature verification
Problem type
Affected products
Dolibarr
ERP CRM
23.0.0 - AFFECTED
23.0.1 - AFFECTED
23.0.2 - AFFECTED
References
VDB-360859 | Dolibarr ERP CRM Online Signature security.lib.php dol_verifyHash signature verification
https://vuldb.com/vuln/360859
VDB-360859 | CTI Indicators (IOB, IOC, IOA)
https://vuldb.com/vuln/360859/cti
Submit #801794 | Dolibarr Dolibarr ERP/CRM 23.0.2 Authentication Bypass Issues
https://vuldb.com/submit/801794
gist.github.com
https://gist.github.com/Shaon-Xis/d6ae069fc54f006457b68a91d5a8e158
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-7689Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-7689",
"assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"assignerShortName": "VulDB",
"dateUpdated": "2026-05-03T09:30:13.135Z",
"dateReserved": "2026-05-02T16:27:26.747Z",
"datePublished": "2026-05-03T09:30:13.135Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "1af790b2-7ee1-4545-860a-a788eba489b5",
"shortName": "VulDB",
"dateUpdated": "2026-05-03T09:30:13.135Z"
},
"title": "Dolibarr ERP CRM Online Signature security.lib.php dol_verifyHash signature verification",
"descriptions": [
{
"lang": "en",
"value": "A security flaw has been discovered in Dolibarr ERP CRM up to 23.0.2. This vulnerability affects the function dol_verifyHash in the library htdocs/core/lib/security.lib.php of the component Online Signature Module. The manipulation results in improper verification of cryptographic signature. The attack may be performed from remote. Attacks of this nature are highly complex. It is stated that the exploitability is difficult. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"affected": [
{
"vendor": "Dolibarr",
"product": "ERP CRM",
"modules": [
"Online Signature Module"
],
"versions": [
{
"version": "23.0.0",
"status": "affected"
},
{
"version": "23.0.1",
"status": "affected"
},
{
"version": "23.0.2",
"status": "affected"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "Improper Verification of Cryptographic Signature",
"cweId": "CWE-347",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"lang": "en",
"description": "Insufficient Verification of Data Authenticity",
"cweId": "CWE-345",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://vuldb.com/vuln/360859",
"name": "VDB-360859 | Dolibarr ERP CRM Online Signature security.lib.php dol_verifyHash signature verification",
"tags": [
"vdb-entry",
"technical-description"
]
},
{
"url": "https://vuldb.com/vuln/360859/cti",
"name": "VDB-360859 | CTI Indicators (IOB, IOC, IOA)",
"tags": [
"signature",
"permissions-required"
]
},
{
"url": "https://vuldb.com/submit/801794",
"name": "Submit #801794 | Dolibarr Dolibarr ERP/CRM 23.0.2 Authentication Bypass Issues",
"tags": [
"third-party-advisory"
]
},
{
"url": "https://gist.github.com/Shaon-Xis/d6ae069fc54f006457b68a91d5a8e158",
"tags": [
"exploit"
]
}
],
"metrics": [
{},
{
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
"baseScore": 3.7,
"baseSeverity": "LOW"
}
},
{
"cvssV3_0": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R",
"baseScore": 3.7,
"baseSeverity": "LOW"
}
},
{
"cvssV2_0": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N/E:POC/RL:ND/RC:UR",
"baseScore": 2.6
}
}
],
"timeline": [
{
"time": "2026-05-02T00:00:00.000Z",
"lang": "en",
"value": "Advisory disclosed"
},
{
"time": "2026-05-02T02:00:00.000Z",
"lang": "en",
"value": "VulDB entry created"
},
{
"time": "2026-05-02T18:32:35.000Z",
"lang": "en",
"value": "VulDB entry last update"
}
],
"credits": [
{
"lang": "en",
"value": "yan1451 (VulDB User)",
"type": "reporter"
},
{
"lang": "en",
"value": "VulDB CNA Team",
"type": "coordinator"
}
],
"tags": [
"x_open-source"
]
}
}
}