{"id":"CVE-2023-4197","details":"Improper input validation in Dolibarr ERP CRM \u003c= v18.0.1 fails to strip certain PHP code from user-supplied input when creating a Website, allowing an attacker to inject and evaluate arbitrary PHP code.","aliases":["BIT-dolibarr-2023-4197","GHSA-r9cm-pw9j-3fpx"],"modified":"2026-04-10T05:01:23.744617Z","published":"2023-11-01T08:15:07.333Z","references":[{"type":"ADVISORY","url":"https://starlabs.sg/advisories/23/23-4197"},{"type":"FIX","url":"https://github.com/Dolibarr/dolibarr/commit/0ed6a63fb06be88be5a4f8bcdee83185eee4087e"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"last_affected":"33857630b4dae439a26fcd21017b220e03e5697d"},{"fixed":"0ed6a63fb06be88be5a4f8bcdee83185eee4087e"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"18.0.1"}]}}],"versions":["14.0.0","14.0.1","18.0.0","18.0.1","3.3.beta1_20121221","3.4.beta1_20130429","3.4.beta1_20130502","3.5.beta1_20131106","3.5.beta1_20131120","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.1","3.6.2","3.6.beta1_20140514","3.7.0","3.7.1","3.8.0-beta","4.0.0-rc","5.0.0-beta","6.0.0-beta"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-4197.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}