Home

Description

FacturaScripts is open-source enterprise resource planning and accounting software. Prior to version 2025.7, a stored cross-site scripting (XSS) vulnerability exists in the product file upload functionality. Authenticated users can upload crafted XML files containing executable JavaScript. These files are later rendered by the application without sufficient sanitization or content-type enforcement, allowing arbitrary JavaScript execution when the file is accessed. Because product files uploaded by regular users are visible to administrative users, this vulnerability can be leveraged to execute malicious JavaScript in an administrator’s browser session. Version 2025.7 fixes the issue.

PUBLISHED Reserved 2025-12-29 | Published 2025-12-30 | Updated 2025-12-30 | Assigner GitHub_M




LOW: 1.2CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

< 2025.7
affected

References

github.com/...cripts/security/advisories/GHSA-2267-xqcf-gw2m

facturascripts.com/...es/ya-disponible-facturascripts-2025-7

github.com/NeoRazorX/facturascripts/releases/tag/v2025.7

cve.org (CVE-2025-69210)

nvd.nist.gov (CVE-2025-69210)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.