Skip to main content

CVE-2022-43138: n/a in n/a

Critical
VulnerabilityCVE-2022-43138cvecve-2022-43138
Published: Thu Nov 17 2022 (11/17/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: n/a
Product: n/a

Description

Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.

AI-Powered Analysis

AILast updated: 07/02/2025, 04:42:58 UTC

Technical Analysis

CVE-2022-43138 is a critical security vulnerability identified in Dolibarr, an open-source ERP (Enterprise Resource Planning) and CRM (Customer Relationship Management) software widely used by businesses for managing various operational processes. This vulnerability affects versions of Dolibarr prior to 14.0.1 and allows attackers to escalate privileges via a crafted API request. Specifically, the flaw is categorized under CWE-269, which relates to improper privilege management. The CVSS v3.1 base score of 9.8 indicates a critical severity level, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N) or user interaction (UI:N), and impacting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). This means an unauthenticated attacker can remotely exploit the vulnerability to gain elevated privileges, potentially taking full control over the affected Dolibarr instance. The lack of authentication and user interaction requirements significantly increases the risk and ease of exploitation. Although no known exploits are currently reported in the wild, the high severity and ease of exploitation make this vulnerability a significant threat. The absence of vendor or product-specific details in the provided data suggests the vulnerability is broadly applicable to all Dolibarr installations prior to version 14.0.1. Given Dolibarr’s role in managing critical business functions such as finance, sales, and customer data, exploitation could lead to unauthorized data access, data manipulation, disruption of business operations, and potential lateral movement within affected networks.

Potential Impact

For European organizations, the impact of CVE-2022-43138 could be substantial. Dolibarr is popular among small to medium-sized enterprises (SMEs) in Europe due to its open-source nature and comprehensive ERP/CRM capabilities. Successful exploitation could lead to unauthorized access to sensitive business data, including financial records, customer information, and internal communications. This could result in data breaches violating GDPR regulations, leading to significant legal and financial penalties. Additionally, attackers gaining elevated privileges could disrupt business operations by altering or deleting critical data, causing operational downtime and loss of revenue. The integrity and availability of business processes managed through Dolibarr could be compromised, affecting supply chain management, invoicing, and customer relationship workflows. The critical nature of this vulnerability also raises concerns about potential use in broader attack campaigns targeting European businesses, especially those lacking robust cybersecurity defenses or timely patch management processes.

Mitigation Recommendations

To mitigate the risks posed by CVE-2022-43138, European organizations using Dolibarr should immediately upgrade to version 14.0.1 or later, where the vulnerability has been addressed. If immediate upgrading is not feasible, organizations should implement network-level protections such as restricting access to the Dolibarr API endpoints through firewalls or VPNs to limit exposure to untrusted networks. Employing Web Application Firewalls (WAFs) with custom rules to detect and block suspicious API requests can provide an additional layer of defense. Regularly auditing user privileges and monitoring logs for unusual access patterns can help detect early signs of exploitation attempts. Organizations should also ensure that their incident response plans include scenarios involving ERP/CRM compromise. Given the criticality and ease of exploitation, patch management processes should be reviewed and improved to ensure timely application of security updates. Finally, conducting security awareness training for IT staff on the importance of securing ERP/CRM systems can help maintain a proactive security posture.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2022-10-17T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983bc4522896dcbee1fc

Added to database: 5/21/2025, 9:09:15 AM

Last enriched: 7/2/2025, 4:42:58 AM

Last updated: 8/14/2025, 6:12:53 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats