FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
References
| Link | Resource |
|---|---|
| https://github.com/NeoRazorX/facturascripts/commit/2afd98cecd26c5f8357e0e321d86063ad1012fc3 | Patch |
| https://github.com/NeoRazorX/facturascripts/releases/tag/v2025.8 | Release Notes |
| https://github.com/NeoRazorX/facturascripts/security/advisories/GHSA-g6w2-q45f-xrp4 | Exploit Vendor Advisory Mitigation |
Configurations
History
No history.
Information
Published : 2026-02-02 23:16
Updated : 2026-02-23 15:32
NVD link : CVE-2026-23476
Mitre link : CVE-2026-23476
CVE.ORG link : CVE-2026-23476
JSON object : View
Products Affected
facturascripts
- facturascripts
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
