Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation: <?PHP instead of <?php in injected data.
https://www.swascan.com/security-advisory-dolibarr-17-0-0/
https://www.swascan.com/blog/
https://github.com/Dolibarr/dolibarr
Source: Mitre, NVD
Published: 2023-05-29
Updated: 2025-01-14
Base Score: 9
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C
Severity: High
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.87948