UBUNTU-CVE-2026-31019

Source
https://ubuntu.com/security/CVE-2026-31019
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-31019.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-31019
Upstream
  • CVE-2026-31019
Published
2026-04-21T15:16:00Z
Modified
2026-05-14T14:32:53.011796Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

In the Website module of Dolibarr ERP & CRM 22.0.4 and below, the application uses blacklist-based filtering to restrict dangerous PHP functions related to system command execution. An authenticated user with permission to edit PHP content can bypass this filtering, resulting in full remote code execution with the ability to execute arbitrary operating system commands on the server.

References

Affected packages

Ubuntu:16.04:LTS / dolibarr

Package

Name
dolibarr
Purl
pkg:deb/ubuntu/dolibarr@3.5.8+dfsg1-1ubuntu1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

3.*
3.5.5+dfsg1-2
3.5.7+dfsg1-1
3.5.8+dfsg1-1
3.5.8+dfsg1-1ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "3.5.8+dfsg1-1ubuntu1",
            "binary_name": "dolibarr"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-31019.json"