Description
A weakness has been identified in Akaunting 3.1.21. This issue affects some unknown processing of the file config/dompdf.php of the component Invoice PDF Rendering. Executing a manipulation can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-09
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A vulnerability in the Invoice PDF Rendering component of Akaunting, specifically in config/dompdf.php, allows an attacker to perform a server‑side request forgery. A crafted request can cause the server to make unintended outbound connections to arbitrary URLs. This flaw can be exploited from outside the application, enabling remote attackers to trigger these forged requests. The exploit code has been publicly released and is actively available.

Affected Systems

The issue affects Akaunting e‑commerce and accounting software, specifically version 3.1.21. No other versions are listed as impacted. Users running this version should verify their installation and check for a newer release that addresses the problem.

Risk and Exploitability

The CVSS score of 5.3 reflects medium severity, and the EPSS score is not available, suggesting that the risk of exploitation at this time is unclear but potentially moderate. The vulnerability is not listed in CISA’s KEV catalog. Given the remote nature of the attack vector and the public availability of the exploit, the risk remains significant for systems that expose the vulnerable PHP file to external traffic. An attacker can potentially cause arbitrary outbound traffic, leading to data leakage or further compromise of external systems.

Generated by OpenCVE AI on May 9, 2026 at 20:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Akaunting to the latest version that contains a fix for the S2R flaw in dompdf.php
  • If an update is not immediately possible, restrict or block outgoing HTTP/HTTPS requests from the web server or the PHP process that hosts dompdf.php to prevent unauthorized target connections
  • Validate and whitelist any URLs that may be processed by dompdf.php, and consider disabling the component entirely if PDFs are not required
  • Deploy a web‑application firewall rule to detect and block suspicious requests that target the dompdf.php entry point

Generated by OpenCVE AI on May 9, 2026 at 20:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 09 May 2026 22:45:00 +0000

Type Values Removed Values Added
First Time appeared Akaunting
Akaunting akaunting
Vendors & Products Akaunting
Akaunting akaunting

Sat, 09 May 2026 19:15:00 +0000

Type Values Removed Values Added
Description A weakness has been identified in Akaunting 3.1.21. This issue affects some unknown processing of the file config/dompdf.php of the component Invoice PDF Rendering. Executing a manipulation can lead to server-side request forgery. The attack may be launched remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
Title Akaunting Invoice PDF Rendering dompdf.php server-side request forgery
Weaknesses CWE-918
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Akaunting Akaunting
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-09T18:45:08.290Z

Reserved: 2026-05-08T19:54:50.827Z

Link: CVE-2026-8193

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-09T19:16:10.290

Modified: 2026-05-09T19:16:10.290

Link: CVE-2026-8193

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-09T22:30:37Z

Weaknesses