{"id":"CVE-2026-34036","summary":"Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php","details":"Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions 22.0.4 and prior, there is a Local File Inclusion (LFI) vulnerability in the core AJAX endpoint /core/ajax/selectobject.php. By manipulating the objectdesc parameter and exploiting a fail-open logic flaw in the core access control function restrictedArea(), an authenticated user with no specific privileges can read the contents of arbitrary non-PHP files on the server (such as .env, .htaccess, configuration backups, or logs…). At time of publication, there are no publicly available patches.","aliases":["GHSA-2mfj-r695-5h9r"],"modified":"2026-04-10T05:43:00.155670Z","published":"2026-03-31T01:39:38.178Z","database_specific":{"cwe_ids":["CWE-98"],"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34036.json","cna_assigner":"GitHub_M"},"references":[{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/34xxx/CVE-2026-34036.json"},{"type":"FIX","url":"https://github.com/Dolibarr/dolibarr/commit/743c22e57c0b2a017d6b92bec865d71ce6177a6a"},{"type":"ADVISORY","url":"https://github.com/Dolibarr/dolibarr/security/advisories/GHSA-2mfj-r695-5h9r"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-34036"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"last_affected":"4f6e636e7e2aea1abde2c2b6f6ac4ffd34429f7f"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"22.0.4"}]}}],"versions":["14.0.0","14.0.1","22.0.0","22.0.1","22.0.2","22.0.3","22.0.4","3.3.beta1_20121221","3.4.beta1_20130429","3.4.beta1_20130502","3.5.beta1_20131106","3.5.beta1_20131120","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.1","3.6.2","3.6.beta1_20140514","3.7.0","3.7.1","3.8.0-beta","4.0.0-rc","5.0.0-beta","6.0.0-beta"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-34036.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N"}]}