{"id":"CVE-2023-38887","details":"File Upload vulnerability in Dolibarr ERP CRM v.17.0.1 and before allows a remote attacker to execute arbitrary code and obtain sensitive information via the extension filtering and renaming functions.","aliases":["BIT-dolibarr-2023-38887","GHSA-g8h7-mcp6-pf47"],"modified":"2026-05-18T05:56:42.028204366Z","published":"2023-09-20T00:00:00Z","database_specific":{"cna_assigner":"mitre","osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/38xxx/CVE-2023-38887.json"},"references":[{"type":"WEB","url":"http://dolibarr.com"},{"type":"WEB","url":"https://akerva.com/wp-content/uploads/2023/09/AKERVA_Security-Advisory_CVE-2023-38887_Dolibarr_AFU.pdf"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/38xxx/CVE-2023-38887.json"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-38887"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/dolibarr/dolibarr","events":[{"introduced":"0"},{"last_affected":"9ec5bd6fc7d9f41549834a9e21aca93b86a208f5"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"17.0.1"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:dolibarr:dolibarr_erp\\/crm:*:*:*:*:*:*:*:*"}}],"versions":["17.0.1","17.0.0","14.0.0","14.0.1","6.0.0-beta","5.0.0-beta","4.0.0-rc","3.8.0-beta","3.7.1","3.7.0","3.6.2","3.6.1","3.6.0","3.6.0-beta","3.6.beta1_20140514","3.6.0-alpha","3.5.beta1_20131120","3.5.beta1_20131106","3.4.beta1_20130502","3.4.beta1_20130429","3.3.beta1_20121221"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-38887.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}