Description
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Invoice Number field. An authenticated administrator can inject malicious JavaScript that executes when any administrator views the affected invoice or visits the dashboard. Version 1.7.1 patches the issue.
Published: 2026-02-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS) via the Invoice Number field affecting administrative users
Action: Patch
AI Analysis

Impact

A stored cross‑site scripting flaw exists in the Invoice Number field of InvoicePlane 1.7.0. An authenticated administrator can embed arbitrary JavaScript into an invoice number. When any administrator views the affected invoice or the dashboard, the injected script is executed in their browser, allowing for defacement, cookie theft, or navigation to malicious sites. This is a classic CWE‑79 input‑validation weakness that can compromise confidentiality and integrity for privileged users.

Affected Systems

The vulnerability applies to the self‑hosted open‑source InvoicePlane application, specifically version 1.7.0 and earlier. The affected component is the invoice number input in the invoice view and dashboard. The patch is delivered in version 1.7.1. Administrators who run older releases or have not applied the update are at risk.

Risk and Exploitability

The CVSS score is 4.8, indicating moderate risk. The EPSS score is below 1 %, suggesting that exploitation is unlikely at the time of this analysis. The flaw is not listed in CISA's KEV catalog. An attacker must first authenticate as an administrator; once they do, the stored payload is executed for any other administrator who opens the invoice or visits the dashboard. Without administrative access the vulnerability is not exploitable, so the threat is confined to privileged users.

Generated by OpenCVE AI on April 17, 2026 at 18:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvoicePlane to version 1.7.1 or later to apply the vendor patch.
  • Inspect all existing invoices for malicious script content and either delete or sanitize the invoice numbers in the database.
  • Verify that the invoice number input field renders safely in the UI; if possible, add output‑encoding or escaping to protect against future injection.

Generated by OpenCVE AI on April 17, 2026 at 18:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Invoiceplane
Invoiceplane invoiceplane
Vendors & Products Invoiceplane
Invoiceplane invoiceplane

Wed, 18 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Invoice Number field. An authenticated administrator can inject malicious JavaScript that executes when any administrator views the affected invoice or visits the dashboard. Version 1.7.1 patches the issue.
Title InvoicePlane has Stored XSS via Invoice Number in Invoice View and Dashboard
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Invoiceplane Invoiceplane
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T17:45:39.099Z

Reserved: 2026-02-03T01:02:46.717Z

Link: CVE-2026-25595

cve-icon Vulnrichment

Updated: 2026-02-19T17:05:07.388Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T23:16:19.910

Modified: 2026-02-20T17:07:50.597

Link: CVE-2026-25595

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:30:05Z

Weaknesses