Description
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Product Unit Name fields. An authenticated administrator can inject malicious JavaScript that executes when any administrator views an invoice containing a product with the malicious unit. Version 1.7.1 patches the issue.
Published: 2026-02-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored XSS
Action: Apply Patch
AI Analysis

Impact

InvoicePlane is a self‑hosted invoicing platform that allows administrators to manage invoices, clients, and payments. A stored cross‑site scripting flaw exists in version 1.7.0. It occurs when an administrator creates or edits a product unit name; the value is saved without proper output encoding and is later rendered unescaped in the invoice item list. An attacker who has authenticated administrator rights can inject arbitrary JavaScript, which is executed in the browser of any administrator who views an invoice that contains a product with a malicious unit name. The flaw is identified as CWE‑79, allowing the attacker to alter user‑agent behavior, steal session cookies, or deface the application.

Affected Systems

Only the 1.7.0 release of InvoicePlane is affected. The vendor product is InvoicePlane, and the vulnerable component is the product unit name input used in the invoice item list. Version 1.7.1 includes a patch that removes the vulnerability.

Risk and Exploitability

The CVSS score is 4.8, classifying it as a medium severity issue, while the EPSS score is less than 1 %, indicating a very low exploitation probability. The vulnerability requires authenticated administrative privileges, so it is not remotely exploitable by unauthenticated users. Because the flaw enables arbitrary script execution only in the administrator’s browser, the immediate impact is limited to accounts that have invoicing rights. The flaw is not listed in the CISA KEV catalog, so no known active exploitation campaigns have been reported yet. Nonetheless, because any administrator viewing an affected invoice can become a vector for further attacks, the risk warrants timely patching.

Generated by OpenCVE AI on April 17, 2026 at 18:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvoicePlane to version 1.7.1 or later to remove the XSS vulnerability.
  • Clean all existing product unit names that contain suspicious or unexpected characters and replace them with plain text.
  • Apply output encoding to the product unit name field and enforce the principle of least privilege for administrative access.

Generated by OpenCVE AI on April 17, 2026 at 18:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:*

Thu, 19 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Invoiceplane
Invoiceplane invoiceplane
Vendors & Products Invoiceplane
Invoiceplane invoiceplane

Wed, 18 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Product Unit Name fields. An authenticated administrator can inject malicious JavaScript that executes when any administrator views an invoice containing a product with the malicious unit. Version 1.7.1 patches the issue.
Title InvoicePlane has Stored XSS via Product Unit Name in Invoice Item List
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Invoiceplane Invoiceplane
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T16:33:52.856Z

Reserved: 2026-02-03T01:02:46.717Z

Link: CVE-2026-25596

cve-icon Vulnrichment

Updated: 2026-02-19T16:33:43.740Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T23:16:20.073

Modified: 2026-02-20T17:07:57.800

Link: CVE-2026-25596

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T18:30:05Z

Weaknesses