CVE-2025-9167: Cross Site Scripting in SolidInvoice
A vulnerability has been found in SolidInvoice up to 2.4.0. This vulnerability affects unknown code of the file /invoice/recurring of the component Recurring Invoice Module. The manipulation of the argument client name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9167 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice versions up to 2.4.0, specifically within the Recurring Invoice Module at the /invoice/recurring endpoint. The vulnerability arises from improper sanitization or validation of the 'client name' parameter, which an attacker can manipulate to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser when they access the affected page. The attack can be initiated remotely without authentication, requiring only user interaction (e.g., the victim visiting a crafted URL or viewing a manipulated invoice). The vendor has not responded to the disclosure, and no official patch or mitigation has been released as of the publication date. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability impacts confidentiality and integrity to a limited extent by enabling session hijacking, credential theft, or unauthorized actions performed in the victim’s browser session. Availability impact is negligible. Although no known exploits are currently observed in the wild, public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations using SolidInvoice for invoicing and recurring billing, this vulnerability poses a moderate risk. Attackers could exploit the XSS flaw to steal session cookies, perform phishing attacks, or execute unauthorized actions on behalf of legitimate users. This could lead to financial fraud, leakage of sensitive client or invoice data, and reputational damage. Since SolidInvoice is a billing system, compromised sessions could allow attackers to manipulate invoices or payment details, impacting business operations and trust. The lack of vendor response and patches increases exposure duration. Organizations with customer bases in Europe, especially SMEs relying on SolidInvoice, are at risk of targeted attacks leveraging this vulnerability. Regulatory compliance such as GDPR may also be impacted if personal data is exposed or mishandled due to exploitation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding on the client name field at the application or web server level to neutralize malicious scripts. Employing a Web Application Firewall (WAF) with custom rules to detect and block XSS payloads targeting the /invoice/recurring endpoint is recommended. Organizations should also restrict access to the invoicing module to trusted IP ranges or VPNs where feasible. User awareness training to recognize phishing attempts and suspicious invoice links can reduce successful exploitation. Monitoring web server logs for unusual query parameters or repeated access attempts to the vulnerable endpoint can help detect exploitation attempts early. Planning for an upgrade or migration to a patched or alternative invoicing solution is advised once available. Regular backups and incident response readiness will mitigate damage if exploitation occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-9167: Cross Site Scripting in SolidInvoice
Description
A vulnerability has been found in SolidInvoice up to 2.4.0. This vulnerability affects unknown code of the file /invoice/recurring of the component Recurring Invoice Module. The manipulation of the argument client name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9167 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice versions up to 2.4.0, specifically within the Recurring Invoice Module at the /invoice/recurring endpoint. The vulnerability arises from improper sanitization or validation of the 'client name' parameter, which an attacker can manipulate to inject malicious scripts. This flaw allows an attacker to execute arbitrary JavaScript code in the context of the victim's browser when they access the affected page. The attack can be initiated remotely without authentication, requiring only user interaction (e.g., the victim visiting a crafted URL or viewing a manipulated invoice). The vendor has not responded to the disclosure, and no official patch or mitigation has been released as of the publication date. The CVSS 4.0 base score is 5.1 (medium severity), reflecting network attack vector, low attack complexity, no privileges required, but user interaction needed. The vulnerability impacts confidentiality and integrity to a limited extent by enabling session hijacking, credential theft, or unauthorized actions performed in the victim’s browser session. Availability impact is negligible. Although no known exploits are currently observed in the wild, public disclosure increases the risk of exploitation attempts.
Potential Impact
For European organizations using SolidInvoice for invoicing and recurring billing, this vulnerability poses a moderate risk. Attackers could exploit the XSS flaw to steal session cookies, perform phishing attacks, or execute unauthorized actions on behalf of legitimate users. This could lead to financial fraud, leakage of sensitive client or invoice data, and reputational damage. Since SolidInvoice is a billing system, compromised sessions could allow attackers to manipulate invoices or payment details, impacting business operations and trust. The lack of vendor response and patches increases exposure duration. Organizations with customer bases in Europe, especially SMEs relying on SolidInvoice, are at risk of targeted attacks leveraging this vulnerability. Regulatory compliance such as GDPR may also be impacted if personal data is exposed or mishandled due to exploitation.
Mitigation Recommendations
Given the absence of an official patch, European organizations should implement immediate compensating controls. These include input validation and output encoding on the client name field at the application or web server level to neutralize malicious scripts. Employing a Web Application Firewall (WAF) with custom rules to detect and block XSS payloads targeting the /invoice/recurring endpoint is recommended. Organizations should also restrict access to the invoicing module to trusted IP ranges or VPNs where feasible. User awareness training to recognize phishing attempts and suspicious invoice links can reduce successful exploitation. Monitoring web server logs for unusual query parameters or repeated access attempts to the vulnerable endpoint can help detect exploitation attempts early. Planning for an upgrade or migration to a patched or alternative invoicing solution is advised once available. Regular backups and incident response readiness will mitigate damage if exploitation occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T13:36:50.988Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4e2f4ad5a09ad00faec80
Added to database: 8/19/2025, 8:47:48 PM
Last enriched: 8/27/2025, 1:14:34 AM
Last updated: 8/27/2025, 1:14:34 AM
Views: 4
Related Threats
CVE-2025-8663: CWE-532 Insertion of Sensitive Information into Log File in upKeeper Solutions upKeeper Manager
HighCVE-2025-9378: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in themehunk Vayu Blocks – Website Builder for the Block Editor
MediumCVE-2025-58210: CWE-862 Missing Authorization in ThemeMove Makeaholic
MediumCVE-2025-21041: CWE-922 Insecure Storage of Sensitive Information in Samsung Mobile Secure Folder
MediumCVE-2025-21040: CWE-925 : Improper Verification of Intent by Broadcast Receiver in Samsung Mobile S Assistant
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.