Eval Injection Affecting dolibarr/dolibarr package, versions <23.0.2


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.33% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Eval Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PHP-DOLIBARRDOLIBARR-15922696
  • published7 Apr 2026
  • disclosed7 Apr 2026
  • creditUnknown

Introduced: 7 Apr 2026

NewCVE-2026-22666  (opens in a new tab)
CWE-95  (opens in a new tab)

How to fix?

Upgrade dolibarr/dolibarr to version 23.0.2 or higher.

Overview

dolibarr/dolibarr is a modern and easy to use web software to manage your business.

Affected versions of this package are vulnerable to Eval Injection via the dol_eval_standard function. An attacker can execute arbitrary commands by injecting malicious payloads through computed extrafields or other evaluation paths using PHP dynamic callable syntax to bypass validation.

CVSS Base Scores

version 4.0
version 3.1