CVE-2025-9168: Cross Site Scripting in SolidInvoice
A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-9168 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice versions up to 2.4.0, specifically within the Invoice Creation Module's /invoice endpoint. The vulnerability arises due to improper sanitization or validation of the 'Client Name' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to craft a specially crafted request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser. The attack vector is remote and does not require prior authentication, although it requires some user interaction (UI:P) to trigger the malicious payload. The CVSS 4.0 score of 5.1 reflects a medium severity level, indicating moderate impact primarily on confidentiality and integrity with limited impact on availability. The vulnerability does not require privileges but does require user interaction, and the scope is unchanged, meaning the exploit affects only the vulnerable component without extending to other system components. The vendor has been contacted but has not responded or provided a patch, and no known exploits are currently observed in the wild. This vulnerability could be leveraged for session hijacking, credential theft, or delivering further malware through the victim's browser, especially targeting users who interact with the invoicing system. Given the nature of invoicing software, which often contains sensitive financial and client data, exploitation could lead to data leakage or unauthorized actions within the invoicing platform.
Potential Impact
For European organizations using SolidInvoice, this vulnerability poses a risk of client-side attacks that could compromise user sessions and expose sensitive financial data. Since invoicing systems are integral to business operations, successful exploitation could disrupt business workflows, lead to data breaches involving client information, and damage organizational reputation. The medium severity suggests that while the vulnerability is not critical, it still presents a tangible risk, especially in environments where multiple users access the invoicing system via web browsers. Attackers could exploit this vulnerability to perform phishing attacks, steal authentication tokens, or manipulate invoice data, potentially leading to financial fraud or compliance violations under regulations such as GDPR. The lack of vendor response and absence of patches increases the risk exposure for organizations relying on this software. Additionally, the remote attack vector means that attackers do not need internal access, increasing the threat surface for organizations with externally accessible invoicing portals.
Mitigation Recommendations
Organizations should immediately assess their use of SolidInvoice and identify if affected versions (2.0 through 2.4.0) are in deployment. Since no official patch is available, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the /invoice endpoint and the Client Name parameter. Input validation and output encoding should be enforced at the application level if source code access and modification are possible. Restricting access to the invoicing system to trusted networks or VPNs can reduce exposure. User education to recognize suspicious invoice-related links or behaviors can help mitigate social engineering attempts leveraging this vulnerability. Monitoring web server logs for unusual requests to the /invoice endpoint and anomalous client-side script execution can aid in early detection. Organizations should also consider isolating the invoicing system from critical internal networks to limit lateral movement in case of compromise. Finally, engaging with the vendor or community for updates or patches and planning for an upgrade once a fix is available is essential.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-9168: Cross Site Scripting in SolidInvoice
Description
A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-9168 is a cross-site scripting (XSS) vulnerability identified in SolidInvoice versions up to 2.4.0, specifically within the Invoice Creation Module's /invoice endpoint. The vulnerability arises due to improper sanitization or validation of the 'Client Name' parameter, which can be manipulated by an attacker to inject malicious scripts. This flaw allows an attacker to craft a specially crafted request that, when processed by the vulnerable endpoint, results in the execution of arbitrary JavaScript code in the context of the victim's browser. The attack vector is remote and does not require prior authentication, although it requires some user interaction (UI:P) to trigger the malicious payload. The CVSS 4.0 score of 5.1 reflects a medium severity level, indicating moderate impact primarily on confidentiality and integrity with limited impact on availability. The vulnerability does not require privileges but does require user interaction, and the scope is unchanged, meaning the exploit affects only the vulnerable component without extending to other system components. The vendor has been contacted but has not responded or provided a patch, and no known exploits are currently observed in the wild. This vulnerability could be leveraged for session hijacking, credential theft, or delivering further malware through the victim's browser, especially targeting users who interact with the invoicing system. Given the nature of invoicing software, which often contains sensitive financial and client data, exploitation could lead to data leakage or unauthorized actions within the invoicing platform.
Potential Impact
For European organizations using SolidInvoice, this vulnerability poses a risk of client-side attacks that could compromise user sessions and expose sensitive financial data. Since invoicing systems are integral to business operations, successful exploitation could disrupt business workflows, lead to data breaches involving client information, and damage organizational reputation. The medium severity suggests that while the vulnerability is not critical, it still presents a tangible risk, especially in environments where multiple users access the invoicing system via web browsers. Attackers could exploit this vulnerability to perform phishing attacks, steal authentication tokens, or manipulate invoice data, potentially leading to financial fraud or compliance violations under regulations such as GDPR. The lack of vendor response and absence of patches increases the risk exposure for organizations relying on this software. Additionally, the remote attack vector means that attackers do not need internal access, increasing the threat surface for organizations with externally accessible invoicing portals.
Mitigation Recommendations
Organizations should immediately assess their use of SolidInvoice and identify if affected versions (2.0 through 2.4.0) are in deployment. Since no official patch is available, mitigation should focus on implementing web application firewalls (WAFs) with rules to detect and block XSS payloads targeting the /invoice endpoint and the Client Name parameter. Input validation and output encoding should be enforced at the application level if source code access and modification are possible. Restricting access to the invoicing system to trusted networks or VPNs can reduce exposure. User education to recognize suspicious invoice-related links or behaviors can help mitigate social engineering attempts leveraging this vulnerability. Monitoring web server logs for unusual requests to the /invoice endpoint and anomalous client-side script execution can aid in early detection. Organizations should also consider isolating the invoicing system from critical internal networks to limit lateral movement in case of compromise. Finally, engaging with the vendor or community for updates or patches and planning for an upgrade once a fix is available is essential.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-08-19T13:36:59.836Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68a4e9fbad5a09ad00fb71ab
Added to database: 8/19/2025, 9:17:47 PM
Last enriched: 8/27/2025, 1:14:50 AM
Last updated: 10/4/2025, 1:06:35 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-24910: CWE-732:IncorrectPermissionAssignmentforCriticalResource in checkpoint ZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,IdentityAgentforWindowsTerminalServer
HighCVE-2023-47488: n/a
MediumCVE-2023-48029: n/a
UnknownCVE-2023-47489: n/a
UnknownCVE-2023-48028: n/a
UnknownActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.