Cross-site Request Forgery (CSRF) Affecting dolibarr/dolibarr package, versions >=10.0.6
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.11% (46th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-PHP-DOLIBARRDOLIBARR-565918
- published 16 Apr 2020
- disclosed 16 Apr 2020
- credit fatihhcelik
Introduced: 16 Apr 2020
CVE-2020-11825 Open this link in a new tabHow to fix?
There is no fixed version for dolibarr/dolibarr
.
Overview
dolibarr/dolibarr is a modern and easy to use web software to manage your business.
Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF). Due to any CSRF token in any user's session can be used in another user's session. CSRF tokens should not be valid in this situation.
References
CVSS Scores
version 3.1