Home

Description

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability exists in InvoicePlane 1.7.0 via the Family Name field. The `family_name` value is rendered without HTML encoding inside the family dropdown on the product form. When an administrator creates a family with a malicious name, the payload executes in the browser of any administrator who visits the product form. Version 1.7.1 patches the issue.

PUBLISHED Reserved 2026-02-03 | Published 2026-02-18 | Updated 2026-02-19 | Assigner GitHub_M




MEDIUM: 4.8CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Product status

<= 1.7.0
affected

References

github.com/...ePlane/security/advisories/GHSA-wrr7-2f27-8h94

github.com/...ommit/93622f2df88a860d89bfee56012cabb2942061d6

cve.org (CVE-2026-25594)

nvd.nist.gov (CVE-2026-25594)

Download JSON