Description
Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.
Published: 2026-03-30
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Server‑Side Request Forgery allows arbitrary outbound requests from the server
Action: Patch Immediately
AI Analysis

Impact

The vulnerability resides in the CheckDatabaseRequest.php file of Invoice Ninja and permits a server‑side request forgery. By manipulating the request, an attacker can instruct the server to send HTTP or other protocol requests to arbitrary destinations. This can be used to reach internal networks, disclose internal resources, or interact with services that are otherwise not exposed externally. The weakness is classified as CWE‑918 and does not directly grant code execution, but it can serve as a stepping‑stone to further attacks.

Affected Systems

The affected product is Invoice Ninja, specifically versions 5.12.46 and 5.12.48. No alternate vendors or product lines are noted as impacted.

Risk and Exploitability

The CVSS score of 7.7 denotes a high severity level. The EPSS score of less than 1% suggests that, as of now, the likelihood of exploitation is low, and the vulnerability is not listed in the CISA KEV catalog. The most probable attack vector involves a remote attacker sending a crafted request to the Setup/CheckDatabase endpoint. If the endpoint is reachable from the public internet or to authenticated users, an attacker could leverage the SSRF to exfiltrate data or reach internal services, potentially leading to a broader compromise. The overall risk depends on the exposure level of the vulnerable endpoint.

Generated by OpenCVE AI on April 2, 2026 at 22:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Invoice Ninja to a version where the SSRF in CheckDatabaseRequest.php has been fixed, such as the most recent release beyond 5.12.48
  • If an upgrade is not immediately possible, restrict access to the Setup/CheckDatabase endpoint to trusted administrators or block it entirely
  • Monitor the application's outbound network activity for unexpected or suspicious connections originating from the application

Generated by OpenCVE AI on April 2, 2026 at 22:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in Invoice Ninja Setup Request Handler

Thu, 02 Apr 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:invoiceninja:invoice_ninja:5.12.46:*:*:*:*:*:*:*
cpe:2.3:a:invoiceninja:invoice_ninja:5.12.48:*:*:*:*:*:*:*

Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in Invoice Ninja 5.12.46 and 5.12.48 Server‑Side Request Forgery in Invoice Ninja Setup Request Handler
First Time appeared Invoiceninja
Invoiceninja invoice Ninja
Vendors & Products Invoiceninja
Invoiceninja invoice Ninja

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in Invoice Ninja 5.12.46 and 5.12.48

Mon, 30 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.
References

Subscriptions

Invoiceninja Invoice Ninja
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T19:16:34.202Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29925

cve-icon Vulnrichment

Updated: 2026-03-30T19:14:39.547Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-30T19:16:24.600

Modified: 2026-04-02T16:58:36.137

Link: CVE-2026-29925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:38:21Z

Weaknesses