{"id":"CVE-2023-30253","details":"Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: \u003c?PHP instead of \u003c?php in injected data.","aliases":["BIT-dolibarr-2023-30253","GHSA-9wqr-5jp4-mjmh"],"modified":"2026-04-10T04:58:00.059513Z","published":"2023-05-29T21:15:09.813Z","references":[{"type":"ADVISORY","url":"https://www.swascan.com/blog/"},{"type":"PACKAGE","url":"https://github.com/Dolibarr/dolibarr"},{"type":"EVIDENCE","url":"https://www.swascan.com/security-advisory-dolibarr-17-0-0/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"fixed":"9ec5bd6fc7d9f41549834a9e21aca93b86a208f5"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"17.0.1"}]}}],"versions":["14.0.0","14.0.1","17.0.0","3.3.beta1_20121221","3.4.beta1_20130429","3.4.beta1_20130502","3.5.beta1_20131106","3.5.beta1_20131120","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.1","3.6.2","3.6.beta1_20140514","3.7.0","3.7.1","3.8.0-beta","4.0.0-rc","5.0.0-beta","6.0.0-beta"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30253.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}