Description
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Family Name field. The `family_name` value is rendered without HTML encoding inside the family dropdown on the product form. When an administrator creates a family with a malicious name, the payload executes in the browser of any administrator who visits the product form. Version 1.7.1 patches the issue.
Published: 2026-02-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Patch
AI Analysis

Impact

The vulnerability is a stored cross‑site scripting flaw stemming from the Family Name field in the product form. When an administrator creates a family with a maliciously crafted name, the name is rendered without HTML encoding in the family dropdown. The payload then executes in any administrator’s browser that opens the product form, enabling an attacker to run arbitrary client‑side scripts, steal session data or deface the UI. This accomplishes malicious code execution on the user’s browser, impacting authentication and session integrity for privileged users.

Affected Systems

The affected product is InvoicePlane, version 1.7.0. The issue is resolved in 1.7.1. The product is a self‑hosted web application for invoice management.

Risk and Exploitability

The CVSS score of 4.8 indicates moderate severity; however the EPSS score is below 1%, suggesting a low probability of mass exploitation. The flaw is currently not listed in the CISA KEV catalog. Attack requires an authenticated administrator to create a malicious family name, after which any admin browsing the product form will trigger the script. The vulnerability is limited to the web browser context of privileged users and does not directly expose server‑side data or privilege escalation beyond the affected tenant.

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvoicePlane to version 1.7.1 or later
  • Audit existing family names and remove any that contain script or HTML markup
  • Monitor the application for suspicious family name entries and verify that the dropdown is properly encoded

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Invoiceplane
Invoiceplane invoiceplane
Vendors & Products Invoiceplane
Invoiceplane invoiceplane

Wed, 18 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Family Name field. The `family_name` value is rendered without HTML encoding inside the family dropdown on the product form. When an administrator creates a family with a malicious name, the payload executes in the browser of any administrator who visits the product form. Version 1.7.1 patches the issue.
Title InvoicePlane has Stored XSS via Family Name in Product Form
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Invoiceplane Invoiceplane
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T17:45:49.423Z

Reserved: 2026-02-03T01:02:46.716Z

Link: CVE-2026-25594

cve-icon Vulnrichment

Updated: 2026-02-19T17:05:10.771Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T23:16:19.747

Modified: 2026-02-20T17:07:45.483

Link: CVE-2026-25594

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses