{"id":"CVE-2019-11201","details":"Dolibarr ERP/CRM 9.0.1 provides a module named website that provides for creation of public websites with a WYSIWYG editor. It was identified that the editor also allowed inclusion of dynamic code, which can lead to code execution on the host machine. An attacker has to check a setting on the same page, which specifies the inclusion of dynamic content. Thus, a lower privileged user of the application can execute code under the context and permissions of the underlying web server.","aliases":["GHSA-jwg3-v9xm-v6q9"],"modified":"2026-04-11T18:24:59.588099Z","published":"2019-07-29T16:15:11.413Z","references":[{"type":"EVIDENCE","url":"https://know.bishopfox.com/advisories/dolibarr-version-9-0-1-vulnerabilities"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"last_affected":"d18a5853df7096f4f6402c12df2a678fc7303234"}],"database_specific":{"cpe":"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:9.0.1:*:*:*:*:*:*:*","source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"9.0.1"}]}}],"versions":["3.3.beta1_20121221","3.4.beta1_20130429","3.4.beta1_20130502","3.5.beta1_20131106","3.5.beta1_20131120","3.6.0","3.6.0-alpha","3.6.0-beta","3.6.1","3.6.2","3.6.beta1_20140514","3.7.0","3.7.1","3.8.0-beta","4.0.0-rc","5.0.0-beta","6.0.0-beta","9.0.0","9.0.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-11201.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H"}]}