{"id":"CVE-2018-19998","details":"SQL injection vulnerability in user/card.php in Dolibarr version 8.0.2 allows remote authenticated users to execute arbitrary SQL commands via the employee parameter.","aliases":["GHSA-97jv-2hp6-3frj"],"modified":"2026-02-24T11:27:40.463281Z","published":"2019-01-03T19:29:01.350Z","references":[{"type":"ADVISORY","url":"https://github.com/Dolibarr/dolibarr/commit/2b088a73c121a52e006c0d76ea4da7ffeb7b4f4a"},{"type":"ADVISORY","url":"https://github.com/Dolibarr/dolibarr/commit/bacd5110fbdc81a35030fdc322775fa15ea85924"},{"type":"FIX","url":"https://github.com/Dolibarr/dolibarr/commit/2b088a73c121a52e006c0d76ea4da7ffeb7b4f4a"},{"type":"FIX","url":"https://github.com/Dolibarr/dolibarr/commit/bacd5110fbdc81a35030fdc322775fa15ea85924"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"last_affected":"85180b117c86ca8a3a2639e5d484711d7c76b494"}]}],"versions":["3.3.0","3.3.1","3.3.2","3.3.3","3.3.beta1_20121221","3.3.beta2_20120109","3.4.0","3.4.1","3.4.2","3.4.beta1_20130429","3.4.beta1_20130502","3.5.0","3.5.2","3.5.3","3.5.4","3.5.5","3.5.6","3.5.7","3.5.8","3.5.beta1_20131106","3.5.beta1_20131120","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.1","3.6.2","3.6.3","3.6.4","3.6.5","3.6.6","3.6.beta1_20140514","3.6.beta2_20140524","3.7.0","3.7.1","3.7.2","3.7.3","3.7.4","3.7.beta1_20141116","3.8.0","3.8.0-beta","3.8.1","3.8.2","3.8.3","3.8.4","3.8.beta1_20150712","3.9.0","3.9.0-rc2","3.9.1","3.9.2","3.9.3","3.9.4","4.0.0","4.0.0-beta","4.0.0-rc","4.0.0-rc2","4.0.1","4.0.2","4.0.3","4.0.4","4.0.5","4.0.6","5.0.0","5.0.0-beta","5.0.0-rc1","5.0.0-rc2","5.0.1","5.0.2","5.0.3","5.0.4","5.0.5","5.0.6","5.0.7","6.0.0","6.0.0-beta","6.0.0-rc","6.0.1","6.0.2","6.0.3","6.0.4","6.0.5","6.0.6","6.0.7","7.0.0","7.0.1","7.0.2","7.0.3","8.0.0","8.0.1","8.0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-19998.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}