Description
Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.
Published: 2026-03-30
Score: 7.7 High
EPSS: n/a
KEV: No
Impact: Server‑Side Request Forgery
Action: Immediate Patch
AI Analysis

Impact

Invoice Ninja versions 5.12.46 and 5.12.48 contain a server‑side request forgery vulnerability in CheckDatabaseRequest.php. The flaw allows an attacker to instruct the application’s server to initiate HTTP requests to arbitrary URLs. This can enable disclosure of internal resources, exfiltration of sensitive data, or further exploitation of the internal network. The impact is that an attacker can gain unauthorized network access beyond the intended scope of the application.

Affected Systems

Any installation of Invoice Ninja running version 5.12.46 or 5.12.48 is affected. The vulnerability is present in the web application irrespective of the underlying operating system or infrastructure. No other versions are listed as impacted.

Risk and Exploitability

The publicly available information does not provide a CVSS score or EPSS data, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is inferred to be remote, relying on the web endpoint that processes the CheckDatabaseRequest. Because the flaw exists in a publicly exposed PHP file, exploitation is likely straightforward for attackers with access to the web interface or the ability to supply requests to the affected endpoint. Until a patch is applied, the risk remains significant.

Generated by OpenCVE AI on March 30, 2026 at 19:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Invoice Ninja to a non‑vulnerable version (consult the vendor’s release notes for a fixed build).
  • If immediate upgrade is not possible, contact Invoice Ninja support for a remediation plan or an interim code fix.
  • Restrict outbound HTTP requests from your web server to prevent the server from contacting internal or external addresses that could be directed by malicious input.

Generated by OpenCVE AI on March 30, 2026 at 19:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 31 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Title Server‑Side Request Forgery in Invoice Ninja 5.12.46 and 5.12.48

Mon, 30 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-918
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 18:45:00 +0000

Type Values Removed Values Added
Description Invoice Ninja v5.12.46 and v5.12.48 is vulnerable to Server-Side Request Forgery (SSRF) in CheckDatabaseRequest.php.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-03-30T19:16:34.202Z

Reserved: 2026-03-04T00:00:00.000Z

Link: CVE-2026-29925

cve-icon Vulnrichment

Updated: 2026-03-30T19:14:39.547Z

cve-icon NVD

Status : Received

Published: 2026-03-30T19:16:24.600

Modified: 2026-03-30T20:16:20.743

Link: CVE-2026-29925

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:56:15Z

Weaknesses