Description
FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
Published: 2026-02-02
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting (potential session hijacking or defacement)
Action: Patch
AI Analysis

Impact

FacturaScripts contains a reflected XSS flaw that surfaces when an attacker triggers a database error by supplying malicious input. The error message is rendered with the Twig | raw filter, which bypasses HTML escaping and allows the attacker to inject arbitrary JavaScript. This can lead to the execution of attacker‑controlled code in the victim’s browser, potentially stealing session cookies, defacing the page, or conducting further attacks.

Affected Systems

Any deployment of NeoRazorX FacturaScripts with a version prior to 2025.8 is vulnerable. No specific sub‑version is singled out; the issue affects the entire codebase that handles error rendering.

Risk and Exploitability

The CVSS score of 5.4 classifies the vulnerability as moderate. The EPSS score is below 1%, indicating a low likelihood of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is remote via web input; exploitation requires ability to supply crafted data to an endpoint that can trigger a database error and expose the error message to the browser. Successful exploitation would provide only client‑side effects, such as session hijacking or defacement, not direct code execution on the server.

Generated by OpenCVE AI on April 18, 2026 at 00:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to FacturaScripts v2025.8, where the raw filter is no longer used for error messages
  • Refactor any custom templates to replace Twig's | raw filter with safe rendering or explicit HTML escaping
  • Audit error handling paths to ensure user input never appears unescaped in responses

Generated by OpenCVE AI on April 18, 2026 at 00:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-g6w2-q45f-xrp4 FacturaScripts is Vulnerable to Reflected XSS
History

Mon, 23 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:*

Wed, 04 Feb 2026 12:30:00 +0000

Type Values Removed Values Added
First Time appeared Facturascripts
Facturascripts facturascripts
Neorazorx
Neorazorx facturascripts
Vendors & Products Facturascripts
Facturascripts facturascripts
Neorazorx
Neorazorx facturascripts

Tue, 03 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
Title FacturaScripts Affected by Reflected XSS
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Facturascripts Facturascripts
Neorazorx Facturascripts
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-03T15:33:51.348Z

Reserved: 2026-01-13T15:47:41.626Z

Link: CVE-2026-23476

cve-icon Vulnrichment

Updated: 2026-02-03T15:33:47.336Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-02T23:16:07.030

Modified: 2026-02-23T15:32:54.620

Link: CVE-2026-23476

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T00:45:32Z

Weaknesses