Impact
FacturaScripts prior to 2025.81 has a SQL injection flaw in its autocomplete feature. An attacker who can log into the application can supply crafted input that is directly concatenated into a SQL query. This lets the attacker read arbitrary database contents, including usernames, passwords, system settings, and all business records.
Affected Systems
NeoRazorX’s FacturaScripts, an open‑source ERP and accounting solution. Any installation running a version older than 2025.81 is vulnerable. The defect is in the CodeModel::all() method used by the autocomplete feature and is addressed in release 2025.81.
Risk and Exploitability
The flaw has an 8.7 CVSS score, indicating high severity and the potential for significant impact. Its EPSS score is below 1%, suggesting a low overall exploitation probability at the moment. It is not currently listed in the CISA KEV catalog. Because the injection requires an authenticated session, the attack vector is internal or requires legitimate access. A successful exploitation would give complete read‑only access to the database, permitting a threat actor to steal sensitive credentials, configuration data, and business information.
OpenCVE Enrichment
Github GHSA