Skip to main content

CVE-2025-9168: Cross Site Scripting in SolidInvoice

Medium
VulnerabilityCVE-2025-9168cvecve-2025-9168
Published: Tue Aug 19 2025 (08/19/2025, 21:02:06 UTC)
Source: CVE Database V5
Product: SolidInvoice

Description

A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 08/19/2025, 21:32:55 UTC

Technical Analysis

CVE-2025-9168 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice, a web-based invoicing application, affecting versions up to and including 2.4.0. The vulnerability resides in the Invoice Creation Module, specifically in the processing of the /invoice endpoint. The flaw arises from improper sanitization or validation of the 'Client Name' parameter, which allows an attacker to inject malicious scripts. This vulnerability can be exploited remotely without authentication, requiring only user interaction to trigger the malicious payload. The vulnerability has a CVSS 4.0 base score of 5.1, indicating a medium severity level. The attack vector is network-based with low attack complexity and no privileges required, but user interaction is necessary to execute the attack. The impact primarily affects the confidentiality and integrity of the affected user's session or data, as the injected scripts could be used to steal cookies, session tokens, or perform actions on behalf of the user. The vendor was notified but did not respond, and no official patches or mitigations have been released. Although no known exploits are currently observed in the wild, the public disclosure of the exploit code increases the risk of exploitation. This vulnerability is significant because SolidInvoice is used by small to medium enterprises for financial operations, and exploitation could lead to unauthorized access to sensitive financial data or manipulation of invoicing information.

Potential Impact

For European organizations using SolidInvoice, this vulnerability could lead to unauthorized disclosure of sensitive client and financial information, potentially violating GDPR requirements for data protection. Attackers could leverage the XSS flaw to hijack user sessions, perform fraudulent invoicing actions, or inject malicious content that compromises the integrity of financial records. The medium severity score reflects a moderate risk; however, the financial nature of the application elevates the potential business impact, including reputational damage and regulatory penalties. Since the vulnerability requires user interaction, phishing or social engineering campaigns could be used to trick employees into triggering the exploit. Organizations relying on SolidInvoice for invoicing and client management should be aware that exploitation could disrupt business operations and lead to financial loss or data breaches.

Mitigation Recommendations

Given the lack of an official patch, European organizations should implement immediate compensating controls. These include: 1) Input validation and sanitization at the web application firewall (WAF) level to detect and block malicious payloads targeting the 'Client Name' parameter; 2) Employ Content Security Policy (CSP) headers to restrict execution of unauthorized scripts; 3) Educate users about phishing risks and suspicious links to reduce the likelihood of user interaction with malicious content; 4) Monitor web server logs and application behavior for unusual activities related to the /invoice endpoint; 5) If feasible, isolate the SolidInvoice application in a segmented network zone with restricted access; 6) Consider migrating to alternative invoicing solutions or upgrading to a patched version once available; 7) Regularly back up invoicing data to enable recovery in case of compromise. Additionally, organizations should maintain up-to-date detection signatures in intrusion detection/prevention systems (IDS/IPS) to identify exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-19T13:36:59.836Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68a4e9fbad5a09ad00fb71ab

Added to database: 8/19/2025, 9:17:47 PM

Last enriched: 8/19/2025, 9:32:55 PM

Last updated: 8/20/2025, 12:35:26 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats