CVE-2025-59467: Vulnerability in Ubiquiti Inc UCRM Argentina AFIP invoices Plugin
A Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin (v1.2.0 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. This plugin is disabled by default. Affected Products: UCRM Argentina AFIP invoices Plugin (Version 1.2.0 and earlier) Mitigation: Update UCRM Argentina AFIP invoices Plugin to Version 1.3.0 or later.
AI Analysis
Technical Summary
CVE-2025-59467 is a Cross-Site Scripting (XSS) vulnerability found in the Ubiquiti UCRM Argentina AFIP invoices Plugin versions 1.2.0 and earlier. This plugin integrates invoicing functionalities related to Argentina's AFIP tax system within the UCRM platform. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to inject malicious scripts. If an administrator visits a crafted malicious page exploiting this XSS flaw, the attacker can escalate privileges, potentially gaining administrative control over the UCRM system. The plugin is disabled by default, which limits the attack surface, but if enabled, the risk is significant. The CVSS 3.1 base score is 7.5, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability’s nature means it could be leveraged for significant system compromise. The recommended mitigation is to update the plugin to version 1.3.0 or later, where the vulnerability has been patched.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial if they use Ubiquiti’s UCRM platform with the Argentina AFIP invoices Plugin enabled. Successful exploitation could allow attackers to gain administrative privileges, leading to unauthorized access to sensitive business and invoicing data, manipulation of financial records, and potential disruption of invoicing operations. This could result in financial loss, regulatory non-compliance, and reputational damage. Since the plugin is related to invoicing for Argentina, European companies with business operations or subsidiaries dealing with Argentine tax compliance are particularly at risk. The vulnerability’s requirement for user interaction (administrator visiting a malicious page) means phishing or social engineering could be used as an attack vector. The high impact on confidentiality, integrity, and availability underscores the critical need for timely patching to prevent potential data breaches or operational disruptions.
Mitigation Recommendations
1. Immediately update the UCRM Argentina AFIP invoices Plugin to version 1.3.0 or later, where the vulnerability is fixed. 2. Disable the plugin if it is not actively used, as it is disabled by default and reducing attack surface is critical. 3. Educate administrators about phishing and social engineering risks to minimize the chance of them visiting malicious pages. 4. Implement web filtering and endpoint protection to block access to known malicious URLs. 5. Monitor UCRM logs for unusual administrative activities that could indicate exploitation attempts. 6. Regularly audit and review plugin usage and permissions within UCRM to ensure least privilege principles are enforced. 7. Consider network segmentation to isolate UCRM systems from general user networks to limit exposure. 8. Stay informed on any emerging exploit reports or patches related to this vulnerability.
Affected Countries
Argentina, Germany, France, United Kingdom, Italy, Spain, Netherlands
CVE-2025-59467: Vulnerability in Ubiquiti Inc UCRM Argentina AFIP invoices Plugin
Description
A Cross-Site Scripting (XSS) vulnerability in the UCRM Argentina AFIP invoices Plugin (v1.2.0 and earlier) could allow privilege escalation if an Administrator is tricked into visiting a crafted malicious page. This plugin is disabled by default. Affected Products: UCRM Argentina AFIP invoices Plugin (Version 1.2.0 and earlier) Mitigation: Update UCRM Argentina AFIP invoices Plugin to Version 1.3.0 or later.
AI-Powered Analysis
Technical Analysis
CVE-2025-59467 is a Cross-Site Scripting (XSS) vulnerability found in the Ubiquiti UCRM Argentina AFIP invoices Plugin versions 1.2.0 and earlier. This plugin integrates invoicing functionalities related to Argentina's AFIP tax system within the UCRM platform. The vulnerability arises from improper sanitization of user-supplied input, allowing an attacker to inject malicious scripts. If an administrator visits a crafted malicious page exploiting this XSS flaw, the attacker can escalate privileges, potentially gaining administrative control over the UCRM system. The plugin is disabled by default, which limits the attack surface, but if enabled, the risk is significant. The CVSS 3.1 base score is 7.5, with the vector indicating network attack vector (AV:N), high attack complexity (AC:H), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability’s nature means it could be leveraged for significant system compromise. The recommended mitigation is to update the plugin to version 1.3.0 or later, where the vulnerability has been patched.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial if they use Ubiquiti’s UCRM platform with the Argentina AFIP invoices Plugin enabled. Successful exploitation could allow attackers to gain administrative privileges, leading to unauthorized access to sensitive business and invoicing data, manipulation of financial records, and potential disruption of invoicing operations. This could result in financial loss, regulatory non-compliance, and reputational damage. Since the plugin is related to invoicing for Argentina, European companies with business operations or subsidiaries dealing with Argentine tax compliance are particularly at risk. The vulnerability’s requirement for user interaction (administrator visiting a malicious page) means phishing or social engineering could be used as an attack vector. The high impact on confidentiality, integrity, and availability underscores the critical need for timely patching to prevent potential data breaches or operational disruptions.
Mitigation Recommendations
1. Immediately update the UCRM Argentina AFIP invoices Plugin to version 1.3.0 or later, where the vulnerability is fixed. 2. Disable the plugin if it is not actively used, as it is disabled by default and reducing attack surface is critical. 3. Educate administrators about phishing and social engineering risks to minimize the chance of them visiting malicious pages. 4. Implement web filtering and endpoint protection to block access to known malicious URLs. 5. Monitor UCRM logs for unusual administrative activities that could indicate exploitation attempts. 6. Regularly audit and review plugin usage and permissions within UCRM to ensure least privilege principles are enforced. 7. Consider network segmentation to isolate UCRM systems from general user networks to limit exposure. 8. Stay informed on any emerging exploit reports or patches related to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-09-16T15:00:07.876Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bec94b7d62031395509d4
Added to database: 1/5/2026, 4:53:40 PM
Last enriched: 1/5/2026, 5:08:41 PM
Last updated: 1/7/2026, 7:58:47 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-31964: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in HCLSoftware BigFix IVR
LowCVE-2025-14802: CWE-639 Authorization Bypass Through User-Controlled Key in thimpress LearnPress – WordPress LMS Plugin
MediumCVE-2025-14792: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in audrasjb Key Figures
MediumCVE-2025-13369: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in premmerce Premmerce WooCommerce Customers Manager
MediumCVE-2025-12449: CWE-862 Missing Authorization in kodezen aBlocks – WordPress Gutenberg Blocks, User Dashboard Builder, Popup Builder, Form Builder & GSAP Animation Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.