Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-40137: n/a

0
Medium
VulnerabilityCVE-2024-40137cvecve-2024-40137
Published: Wed Jul 24 2024 (07/24/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Dolibarr ERP CRM before 19.0.2-php8.2 was discovered to contain a remote code execution (RCE) vulnerability via the Computed field parameter under the Users Module Setup function.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 05:14:26 UTC

Technical Analysis

CVE-2024-40137 is a remote code execution (RCE) vulnerability identified in Dolibarr ERP CRM versions before 19.0.2-php8.2. The vulnerability arises from improper handling of the Computed field parameter within the Users Module Setup function. This flaw allows an authenticated user with high privileges to inject and execute arbitrary code remotely, potentially compromising the integrity of the system. The vulnerability is categorized under CWE-74, which involves improper neutralization of special elements in output, leading to injection attacks. The CVSS v3.1 base score is 5.5, with vector AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N, indicating network attack vector, low attack complexity, required high privileges, no user interaction, unchanged scope, low confidentiality impact, high integrity impact, and no availability impact. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the potential for code execution within critical ERP/CRM infrastructure. Dolibarr ERP CRM is widely used by small and medium enterprises for resource planning and customer relationship management, making this vulnerability impactful in business environments. The lack of an official patch link suggests that users should monitor vendor advisories closely and apply updates once available. The vulnerability's exploitation requires authenticated access with elevated privileges, which somewhat limits the attack surface but does not eliminate the risk, especially in environments with weak internal access controls or compromised credentials.

Potential Impact

The primary impact of CVE-2024-40137 is the potential for remote code execution by an authenticated user with high privileges, which can lead to full system compromise, unauthorized data modification, and disruption of business processes. The integrity of critical business data managed by Dolibarr ERP CRM can be severely affected, potentially leading to financial loss, operational downtime, and reputational damage. Although confidentiality impact is rated low, the ability to execute arbitrary code can be leveraged to escalate privileges further or pivot within the network. The absence of availability impact means the system may continue to operate, masking the presence of an attacker. Organizations relying on Dolibarr for ERP and CRM functions, especially those with insufficient internal access controls or weak credential management, face increased risk. The medium CVSS score reflects the balance between the requirement for high privileges and the severity of the impact. The threat is particularly concerning for sectors where Dolibarr is integrated with sensitive business operations, such as finance, manufacturing, and public administration.

Mitigation Recommendations

To mitigate CVE-2024-40137, organizations should promptly upgrade Dolibarr ERP CRM to version 19.0.2-php8.2 or later once the patch is officially released. Until a patch is available, restrict access to the Users Module Setup function to only the most trusted administrators and implement strict role-based access controls to minimize the number of users with high privileges. Conduct thorough audits of user accounts and credentials to ensure no unauthorized or weak credentials exist. Employ network segmentation to isolate ERP/CRM systems from less trusted network zones and monitor logs for unusual activity related to the Users Module. Implement multi-factor authentication (MFA) for all administrative access to reduce the risk of credential compromise. Additionally, apply web application firewalls (WAF) with custom rules to detect and block suspicious payloads targeting the Computed field parameter. Regularly back up critical ERP/CRM data and verify the integrity of backups to enable recovery in case of compromise. Finally, maintain up-to-date threat intelligence feeds and monitor vendor advisories for any emerging exploit information or patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-07-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ca6b7ef31ef0b56730d

Added to database: 2/25/2026, 9:41:58 PM

Last enriched: 2/28/2026, 5:14:26 AM

Last updated: 4/12/2026, 5:14:32 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses