CVE-2025-9168: Cross Site Scripting in SolidInvoice
A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9168 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice, a web-based invoicing application, affecting versions up to and including 2.4.0. The vulnerability resides in the Invoice Creation Module, specifically in the processing of the /invoice endpoint. The flaw arises from improper sanitization or validation of the 'Client Name' parameter, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to execute the attack. The impact primarily affects the confidentiality and integrity of the affected user's session or data, as the injected scripts could be used to steal cookies, session tokens, or perform actions on behalf of the user. The vendor was notified but did not respond, and no official patches or mitigations have been released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability is significant because SolidInvoice is used by small to medium enterprises for financial operations, and exploitation could lead to unauthorized access to sensitive financial data or manipulation of invoicing information.
Potential Impact
For European organizations using SolidInvoice, this vulnerability could lead to unauthorized disclosure of sensitive client and financial information, potentially violating GDPR requirements for data protection. Attackers could leverage the XSS flaw to hijack user sessions, perform fraudulent invoicing actions, or inject malicious content that compromises the integrity of financial records. The medium severity score reflects a moderate risk; however, the financial nature of the application elevates the potential business impact, including reputational damage and regulatory penalties. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into triggering the exploit. Organizations relying on SolidInvoice for invoicing and client management should be aware that exploitation could disrupt business operations and lead to financial loss or data breaches.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Input validation and sanitization at the web application firewall (WAF) level to detect and block malicious payloads targeting the 'Client Name' parameter; 2) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts; 3) Educate users about phishing risks and suspicious links to reduce the likelihood of user interaction with malicious content; 4) Monitor web server logs and application behavior for unusual activities related to the /invoice endpoint; 5) If feasible, isolate the SolidInvoice application in a segmented network zone with restricted access; 6) Consider migrating to alternative invoicing solutions or upgrading to a patched version once available; 7) Regularly back up invoicing data to enable recovery in case of compromise. Additionally, organizations should maintain up-to-date detection signatures in intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2025-9168: Cross Site Scripting in SolidInvoice
Description
A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9168 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice, a web-based invoicing application, affecting versions up to and including 2.4.0. The vulnerability resides in the Invoice Creation Module, specifically in the processing of the /invoice endpoint. The flaw arises from improper sanitization or validation of the 'Client Name' parameter, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to execute the attack. The impact primarily affects the confidentiality and integrity of the affected user's session or data, as the injected scripts could be used to steal cookies, session tokens, or perform actions on behalf of the user. The vendor was notified but did not respond, and no official patches or mitigations have been released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability is significant because SolidInvoice is used by small to medium enterprises for financial operations, and exploitation could lead to unauthorized access to sensitive financial data or manipulation of invoicing information.
Potential Impact
For European organizations using SolidInvoice, this vulnerability could lead to unauthorized disclosure of sensitive client and financial information, potentially violating GDPR requirements for data protection. Attackers could leverage the XSS flaw to hijack user sessions, perform fraudulent invoicing actions, or inject malicious content that compromises the integrity of financial records. The medium severity score reflects a moderate risk; however, the financial nature of the application elevates the potential business impact, including reputational damage and regulatory penalties. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into triggering the exploit. Organizations relying on SolidInvoice for invoicing and client management should be aware that exploitation could disrupt business operations and lead to financial loss or data breaches.
Mitigation Recommendations
Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Input validation and sanitization at the web application firewall (WAF) level to detect and block malicious payloads targeting the 'Client Name' parameter; 2) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts; 3) Educate users about phishing risks and suspicious links to reduce the likelihood of user interaction with malicious content; 4) Monitor web server logs and application behavior for unusual activities related to the /invoice endpoint; 5) If feasible, isolate the SolidInvoice application in a segmented network zone with restricted access; 6) Consider migrating to alternative invoicing solutions or upgrading to a patched version once available; 7) Regularly back up invoicing data to enable recovery in case of compromise. Additionally, organizations should maintain up-to-date detection signatures in intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T13:36:59.836Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4e9fbad5a09ad00fb71ab
Added to database: 8/19/2025, 9:17:47 PM
Last enriched: 8/19/2025, 9:32:55 PM
Last updated: 8/20/2025, 12:35:26 AM
Views: 3
Related Threats
CVE-2025-9132: Out of bounds write in Google Chrome
HighCVE-2025-9193: Open Redirect in TOTVS Portal Meu RH
MediumCVE-2025-9176: OS Command Injection in neurobin shc
MediumCVE-2025-9175: Stack-based Buffer Overflow in neurobin shc
MediumCVE-2025-9174: OS Command Injection in neurobin shc
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.