Description
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane (latest version) that allows an authenticated user with permissions to manage Invoice Groups to inject malicious JavaScript into the "Identifier Format" field. This script executes when any user views the invoice list or the main dashboard. Version 1.7.1 patches the issue.
Published: 2026-02-18
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting (XSS) in the Identifier Format field
Action: Apply Patch
AI Analysis

Impact

InvoicePlane versions before 1.7.1 store unsanitized input in the Identifier Format field. An authenticated user who can manage Invoice Groups can insert arbitrary JavaScript. When any user opens the invoice list or main dashboard the stored script runs in that user’s browser, allowing attackers to hijack sessions, deface the interface, or execute further client‑side attacks. The flaw therefore grants a cross‑site scripting flaw that can be abused by users with appropriate permissions. Based on the description, it is inferred that the attacker must first be authenticated and have permission to manage invoice groups to perform the injection.

Affected Systems

The affected product is InvoicePlane from the InvoicePlane vendor. All releases prior to version 1.7.1, including 1.7.0, are vulnerable. Users should verify whether their instance is running a patched version.

Risk and Exploitability

The CVSS score of 5.4 indicates a moderate severity. The EPSS score of less than 1% suggests the likelihood of exploitation is low, and the vulnerability is not currently listed in CISA’s KEV catalog. Exploitation requires an authenticated user with permissions to manage Invoice Groups; the attacker can then embed malicious code that is executed whenever any user views the invoice list or main dashboard. Based on the description, it is inferred that the attacker must be authenticated and have group management rights to embed malicious code. Because the attack vector is limited to users with specific privileges, it is less likely to be publicly exploited but still poses an internal risk to the organization.

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade InvoicePlane to version 1.7.1 or later to remove the stored XSS flaw
  • Revoke "Manage Invoice Groups" permissions from users who do not need them until the patch is applied
  • If a patch is unavailable immediately, sanitize or clear the Identifier Format field to prevent script injection, or block its use via configuration or a web application firewall

Generated by OpenCVE AI on April 18, 2026 at 11:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:invoiceplane:invoiceplane:1.7.0:-:*:*:*:*:*:*

Thu, 19 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Invoiceplane
Invoiceplane invoiceplane
Vendors & Products Invoiceplane
Invoiceplane invoiceplane

Wed, 18 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Description InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane (latest version) that allows an authenticated user with permissions to manage Invoice Groups to inject malicious JavaScript into the "Identifier Format" field. This script executes when any user views the invoice list or the main dashboard. Version 1.7.1 patches the issue.
Title InvoicePlane has Stored Cross-Site Scripting Issue in Identifier Formatting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Invoiceplane Invoiceplane
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-19T16:42:10.944Z

Reserved: 2026-02-12T17:10:53.413Z

Link: CVE-2026-26270

cve-icon Vulnrichment

Updated: 2026-02-19T16:42:03.464Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-18T23:16:20.237

Modified: 2026-02-20T17:13:26.497

Link: CVE-2026-26270

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T12:00:05Z

Weaknesses