Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "doleval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "strreplace" and can be bypassed using following code in $s parameter
{ "nvd_published_at": "2022-03-02T16:15:00Z", "github_reviewed_at": "2022-03-03T19:12:38Z", "severity": "HIGH", "github_reviewed": true, "cwe_ids": [ "CWE-94" ] }