Impact
FacturaScripts versions 2026 and earlier contain a failure to sanitize file paths in uploaded ZIP archives. This allows an attacker to perform a Zip Slip attack that writes arbitrary files outside the intended plugins directory, including overwriting PHP files executable by the web server. The result is remote code execution, with full control over the system. The weakness involves improper input validation (CWE‑20) and unrestricted uploading of archives (CWE‑434).
Affected Systems
NeoRazorX FacturaScripts, specifically the FacturaScripts application. Affected versions are 2026 and all earlier releases. The flaw is addressed in version 2026.1.
Risk and Exploitability
The vulnerability has a CVSS score of 7.2, indicating a high risk to confidentiality, integrity, and availability. EPSS is not available, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector requires access to the plugin upload interface, which typically requires authenticated application access. An attacker who obtains the ability to upload plugins can craft a ZIP containing a path such as "ValidPluginName/../../shell.php"; during extraction the path traversal overwrites a PHP file, allowing arbitrary code execution. The exploitation burden is relatively low because the validation logic is simple. Because of the high potential impact, rapid patching or mitigations is strongly recommended.
OpenCVE Enrichment
Github GHSA