Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64012: n/a

0
Medium
VulnerabilityCVE-2025-64012cvecve-2025-64012
Published: Tue Dec 16 2025 (12/16/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

InvoicePlane commit debb446c is vulnerable to Incorrect Access Control. The invoices/view handler fails to verify ownership before returning invoice data.

AI-Powered Analysis

AILast updated: 12/23/2025, 15:49:43 UTC

Technical Analysis

CVE-2025-64012 identifies an incorrect access control vulnerability in the InvoicePlane application, specifically in the invoices/view handler. InvoicePlane is an open-source invoicing system used by small and medium enterprises (SMEs) to manage invoices and billing. The vulnerability arises because the handler responsible for displaying invoice data fails to verify whether the requesting user actually owns the invoice they are trying to access. This lack of ownership verification means that an authenticated user with limited privileges can potentially access invoice data belonging to other users or organizations. The vulnerability is classified under CWE-639 (Incorrect Access Control), which typically involves improper enforcement of permissions leading to unauthorized information disclosure. The CVSS 3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, indicating that the vulnerability is remotely exploitable over the network, requires low attack complexity, requires privileges (authenticated user), no user interaction, unchanged scope, and results in limited confidentiality impact without affecting integrity or availability. No patches or known exploits have been reported as of the publication date. The vulnerability could lead to unauthorized disclosure of sensitive invoice data, potentially exposing financial information, client details, and transaction records.

Potential Impact

For European organizations, especially SMEs relying on InvoicePlane for invoicing and financial management, this vulnerability poses a risk of unauthorized disclosure of sensitive financial data. Confidentiality breaches could lead to exposure of client information, pricing details, and transaction histories, which may result in reputational damage, loss of customer trust, and potential regulatory penalties under GDPR for improper data protection. While the vulnerability does not affect data integrity or availability, the unauthorized access to invoice data could facilitate further social engineering or targeted attacks. Organizations with multi-tenant or shared InvoicePlane deployments are particularly at risk, as cross-tenant data leakage could occur. The medium severity rating suggests that while the impact is not critical, the risk is significant enough to warrant prompt remediation to prevent data leaks and comply with European data protection standards.

Mitigation Recommendations

To mitigate CVE-2025-64012, organizations should immediately review and enhance access control mechanisms within InvoicePlane, particularly the invoices/view handler. Developers or administrators should implement strict ownership verification checks to ensure that users can only access invoices they own or are authorized to view. Role-based access control (RBAC) policies should be enforced rigorously, limiting invoice visibility according to user roles and permissions. Until an official patch is released, organizations can consider applying custom code fixes or access control filters at the web server or application firewall level to restrict unauthorized invoice access. Regular audits and penetration testing focused on access control should be conducted to detect similar issues. Additionally, monitoring and logging access to invoice data can help identify suspicious access patterns. Organizations should also keep abreast of any official patches or updates from InvoicePlane and apply them promptly once available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 694178b209f61faec590733b

Added to database: 12/16/2025, 3:20:18 PM

Last enriched: 12/23/2025, 3:49:43 PM

Last updated: 2/7/2026, 6:51:15 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats