CVE-2025-56588

| EUVD-2025-32690 HIGH
8.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 13, 2026 - 18:18 vuln.today
EUVD ID Assigned
Mar 13, 2026 - 18:18 euvd
EUVD-2025-32690
Patch Released
Oct 22, 2025 - 15:56 nvd
Patch available
CVE Published
Oct 01, 2025 - 20:18 nvd
HIGH 8.8

Description

Dolibarr ERP & CRM v21.0.1 were discovered to contain a remote code execution (RCE) vulnerability in the User module configuration via the computed field parameter.

Analysis

Dolibarr ERP & CRM v21.0.1 were discovered to contain a remote code execution (RCE) vulnerability in the User module configuration via the computed field parameter.

Technical Context

Remote code execution allows an attacker to run arbitrary commands or code on the target system over a network without prior authentication. This vulnerability is classified as Code Injection (CWE-94).

Affected Products

Affected products: Dolibarr Dolibarr Erp\/Crm 21.0.1

Remediation

A vendor patch is available — apply it immediately. Apply vendor patches immediately. Restrict network access to vulnerable services. Implement network segmentation and monitoring for anomalous activity.

Priority Score

44
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +44
POC: 0

Vendor Status

Ubuntu

Priority: Medium
dolibarr
Release Status Version
xenial needs-triage -
jammy DNE -
noble DNE -
plucky DNE -
upstream needs-triage -
questing DNE -

Debian

dolibarr
Release Status Fixed Version Urgency
(unstable) fixed (unfixed) -

Share

CVE-2025-56588 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy