CVE-2026-34036

Source
https://cve.org/CVERecord?id=CVE-2026-34036
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34036.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-34036
Aliases
Downstream
Published
2026-03-31T01:39:38.178Z
Modified
2026-04-10T05:43:00.155670Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php
Details

Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions 22.0.4 and prior, there is a Local File Inclusion (LFI) vulnerability in the core AJAX endpoint /core/ajax/selectobject.php. By manipulating the objectdesc parameter and exploiting a fail-open logic flaw in the core access control function restrictedArea(), an authenticated user with no specific privileges can read the contents of arbitrary non-PHP files on the server (such as .env, .htaccess, configuration backups, or logs…). At time of publication, there are no publicly available patches.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34036.json",
    "cwe_ids": [
        "CWE-98"
    ]
}
References

Affected packages

Git / github.com/dolibarr/dolibarr

Affected ranges

Type
GIT
Repo
https://github.com/dolibarr/dolibarr
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Database specific
{
    "versions": [
        {
            "introduced": "0"
        },
        {
            "last_affected": "22.0.4"
        }
    ]
}

Affected versions

14.*
14.0.0
14.0.1
22.*
22.0.0
22.0.1
22.0.2
22.0.3
22.0.4
3.*
3.3.beta1_20121221
3.4.beta1_20130429
3.4.beta1_20130502
3.5.beta1_20131106
3.5.beta1_20131120
3.6.0
3.6.0-alpha
3.6.0-beta
3.6.1
3.6.2
3.6.beta1_20140514
3.7.0
3.7.1
3.8.0-beta
4.*
4.0.0-rc
5.*
5.0.0-beta
6.*
6.0.0-beta

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34036.json"