CVE-2026-34036PHP Remote File Inclusion in Dolibarr

Severity
6.5MEDIUMNVD
EPSS
0.0%
top 90.57%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 31

Description

Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package. In versions 22.0.4 and prior, there is a Local File Inclusion (LFI) vulnerability in the core AJAX endpoint /core/ajax/selectobject.php. By manipulating the objectdesc parameter and exploiting a fail-open logic flaw in the core access control function restrictedArea(), an authenticated user with no specific privileges can read the contents of arbitrary non-PHP files on the server (such

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

CVEListV5dolibarr/dolibarr22.0.4
Packagistdolibarr/dolibarr22.0.4

Patches

🔴Vulnerability Details

4
OSV
CVE-2026-34036: Dolibarr is an enterprise resource planning (ERP) and customer relationship management (CRM) software package2026-03-31
CVEList
Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php2026-03-31
GHSA
Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php2026-03-27
OSV
Dolibarr Core Discloses Sensitive Data via Authenticated Local File Inclusion in selectobject.php2026-03-27

🕵️Threat Intelligence

1
Wiz
CVE-2026-34036 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-34036 — PHP Remote File Inclusion in Dolibarr | cvebase