CVE-2025-69634: n/a
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can only occur if an unprivileged user knows the token of an admin user.
AI Analysis
Technical Summary
CVE-2025-69634 is a critical security vulnerability classified as a Cross Site Request Forgery (CSRF) affecting Dolibarr ERP & CRM version 22.0.9. The flaw resides in the perms.php component, specifically via the notes field, which an attacker can exploit to escalate privileges remotely. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests, potentially leading to unauthorized actions. In this case, the attacker targets the privilege escalation mechanism, which could grant them elevated access rights within the ERP/CRM system. However, there is a dispute from a third party indicating that exploitation may require the attacker to know the admin user's CSRF token, which would limit the attack vector to scenarios where such tokens are leaked or exposed. The vulnerability is associated with CWE-352 (CSRF), CWE-598 (Information Exposure), and CWE-284 (Improper Access Control), highlighting issues with request forgery, token management, and access control enforcement. The CVSS v3.1 score of 9.0 reflects a critical severity due to the network attack vector, low attack complexity, required privileges at a low level, user interaction, and a scope change affecting confidentiality, integrity, and availability. No patches or known exploits are currently available, but the vulnerability's presence in a widely used ERP/CRM platform makes it a significant concern for organizations relying on Dolibarr for business operations.
Potential Impact
The impact of CVE-2025-69634 is substantial for organizations using Dolibarr ERP & CRM, as successful exploitation can lead to privilege escalation, compromising the confidentiality, integrity, and availability of sensitive business data. Attackers gaining elevated privileges could manipulate financial records, customer data, or internal workflows, potentially causing financial loss, reputational damage, and operational disruption. The vulnerability's network accessibility and low attack complexity increase the risk of exploitation, especially in environments where user tokens might be exposed or where users are susceptible to social engineering. The disputed requirement of knowing an admin token may limit exploitation but does not eliminate risk, particularly in poorly secured deployments. Given Dolibarr's use in small to medium enterprises globally, the threat could affect a broad range of industries, including finance, manufacturing, and services, where ERP and CRM systems are critical. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
To mitigate CVE-2025-69634, organizations should implement several specific measures beyond generic advice: 1) Immediately monitor Dolibarr ERP & CRM for updates or patches addressing this vulnerability and apply them promptly once available. 2) Enforce strict CSRF token management policies, ensuring tokens are unique per session and not exposed in URLs or logs. 3) Limit user privileges rigorously, applying the principle of least privilege to reduce the impact of any compromised account. 4) Implement multi-factor authentication (MFA) for administrative accounts to reduce the risk of token theft or misuse. 5) Conduct regular security audits and penetration testing focused on CSRF and access control mechanisms within Dolibarr. 6) Educate users about phishing and social engineering risks that could lead to token exposure. 7) Use web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting perms.php or similar endpoints. 8) Isolate Dolibarr instances within secure network segments and restrict access to trusted IP ranges where feasible. These targeted actions will reduce the likelihood and impact of exploitation while maintaining operational continuity.
Affected Countries
United States, France, Germany, United Kingdom, Canada, Australia, India, Brazil, Italy, Spain
CVE-2025-69634: n/a
Description
Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php NOTE: this is disputed by a third party who indicates that exploitation can only occur if an unprivileged user knows the token of an admin user.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-69634 is a critical security vulnerability classified as a Cross Site Request Forgery (CSRF) affecting Dolibarr ERP & CRM version 22.0.9. The flaw resides in the perms.php component, specifically via the notes field, which an attacker can exploit to escalate privileges remotely. CSRF vulnerabilities allow attackers to trick authenticated users into submitting unauthorized requests, potentially leading to unauthorized actions. In this case, the attacker targets the privilege escalation mechanism, which could grant them elevated access rights within the ERP/CRM system. However, there is a dispute from a third party indicating that exploitation may require the attacker to know the admin user's CSRF token, which would limit the attack vector to scenarios where such tokens are leaked or exposed. The vulnerability is associated with CWE-352 (CSRF), CWE-598 (Information Exposure), and CWE-284 (Improper Access Control), highlighting issues with request forgery, token management, and access control enforcement. The CVSS v3.1 score of 9.0 reflects a critical severity due to the network attack vector, low attack complexity, required privileges at a low level, user interaction, and a scope change affecting confidentiality, integrity, and availability. No patches or known exploits are currently available, but the vulnerability's presence in a widely used ERP/CRM platform makes it a significant concern for organizations relying on Dolibarr for business operations.
Potential Impact
The impact of CVE-2025-69634 is substantial for organizations using Dolibarr ERP & CRM, as successful exploitation can lead to privilege escalation, compromising the confidentiality, integrity, and availability of sensitive business data. Attackers gaining elevated privileges could manipulate financial records, customer data, or internal workflows, potentially causing financial loss, reputational damage, and operational disruption. The vulnerability's network accessibility and low attack complexity increase the risk of exploitation, especially in environments where user tokens might be exposed or where users are susceptible to social engineering. The disputed requirement of knowing an admin token may limit exploitation but does not eliminate risk, particularly in poorly secured deployments. Given Dolibarr's use in small to medium enterprises globally, the threat could affect a broad range of industries, including finance, manufacturing, and services, where ERP and CRM systems are critical. The absence of known exploits in the wild provides a window for proactive mitigation before active attacks emerge.
Mitigation Recommendations
To mitigate CVE-2025-69634, organizations should implement several specific measures beyond generic advice: 1) Immediately monitor Dolibarr ERP & CRM for updates or patches addressing this vulnerability and apply them promptly once available. 2) Enforce strict CSRF token management policies, ensuring tokens are unique per session and not exposed in URLs or logs. 3) Limit user privileges rigorously, applying the principle of least privilege to reduce the impact of any compromised account. 4) Implement multi-factor authentication (MFA) for administrative accounts to reduce the risk of token theft or misuse. 5) Conduct regular security audits and penetration testing focused on CSRF and access control mechanisms within Dolibarr. 6) Educate users about phishing and social engineering risks that could lead to token exposure. 7) Use web application firewalls (WAFs) with rules designed to detect and block CSRF attack patterns targeting perms.php or similar endpoints. 8) Isolate Dolibarr instances within secure network segments and restrict access to trusted IP ranges where feasible. These targeted actions will reduce the likelihood and impact of exploitation while maintaining operational continuity.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2026-01-09T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 698df2f6c9e1ff5ad8e60c1a
Added to database: 2/12/2026, 3:34:14 PM
Last enriched: 2/19/2026, 6:01:56 PM
Last updated: 3/29/2026, 7:44:11 PM
Views: 78
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.