CVE-2026-23476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
CVE-2026-23476 is a reflected cross-site scripting (XSS) vulnerability in FacturaScripts, an open-source ERP and accounting software by NeoRazorX, affecting versions prior to 2025. 8. The flaw arises from improper sanitization when displaying error messages triggered by database input errors, due to the use of Twig's | raw filter which bypasses HTML escaping. An attacker can exploit this by causing a database error with crafted input, leading to execution of malicious scripts in the victim's browser. The vulnerability requires low privileges but does require user interaction and results in partial confidentiality and integrity impact without affecting availability. It is rated medium severity with a CVSS score of 5. 4 and has no known exploits in the wild. The issue is fixed in version 2025. 8. European organizations using vulnerable versions of FacturaScripts, especially in finance and accounting roles, should prioritize patching to prevent potential targeted attacks.
AI Analysis
Technical Summary
FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises. CVE-2026-23476 is a reflected cross-site scripting vulnerability identified in versions prior to 2025.8. The root cause is the use of Twig's | raw filter when rendering error messages generated by database input validation failures. Specifically, when a user inputs data that triggers a database error (e.g., submitting a string where an integer is expected), the error message includes this unsanitized input and is rendered directly in the web interface without proper HTML escaping. This improper neutralization of input (CWE-79) allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser session. The vulnerability requires the attacker to have low privileges (authenticated user) and to trick a user into triggering the error message (user interaction required). The CVSS 3.1 base score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, requirement for privileges and user interaction, and partial confidentiality and integrity impacts without availability impact. No known exploits have been reported in the wild as of the publication date. The vendor fixed the issue in version 2025.8 by properly sanitizing error message outputs. Organizations running vulnerable versions should upgrade promptly to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions within the FacturaScripts application. Given FacturaScripts' role in financial and accounting processes, such attacks could facilitate fraud or data leakage. Although availability is not impacted, the trustworthiness of financial data and user accounts could be compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or where social engineering is feasible. Organizations in Europe with extensive SME sectors relying on FacturaScripts for ERP and accounting functions are at heightened risk. The absence of known exploits suggests limited active targeting currently, but the vulnerability remains exploitable until patched.
Mitigation Recommendations
The primary mitigation is to upgrade FacturaScripts to version 2025.8 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict input validation and sanitization at the application and database layers to prevent injection of malicious input that triggers error messages. Web application firewalls (WAFs) can be configured to detect and block suspicious input patterns that may exploit this XSS flaw. Educate users to avoid interacting with suspicious links or inputs that could trigger error messages. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Regularly audit and monitor application logs for unusual error message patterns or signs of attempted exploitation. Finally, ensure secure coding practices are followed in customizations or plugins to avoid similar issues.
Affected Countries
Germany, France, Spain, Italy, Netherlands, Belgium, Poland
CVE-2026-23476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
Description
CVE-2026-23476 is a reflected cross-site scripting (XSS) vulnerability in FacturaScripts, an open-source ERP and accounting software by NeoRazorX, affecting versions prior to 2025. 8. The flaw arises from improper sanitization when displaying error messages triggered by database input errors, due to the use of Twig's | raw filter which bypasses HTML escaping. An attacker can exploit this by causing a database error with crafted input, leading to execution of malicious scripts in the victim's browser. The vulnerability requires low privileges but does require user interaction and results in partial confidentiality and integrity impact without affecting availability. It is rated medium severity with a CVSS score of 5. 4 and has no known exploits in the wild. The issue is fixed in version 2025. 8. European organizations using vulnerable versions of FacturaScripts, especially in finance and accounting roles, should prioritize patching to prevent potential targeted attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises. CVE-2026-23476 is a reflected cross-site scripting vulnerability identified in versions prior to 2025.8. The root cause is the use of Twig's | raw filter when rendering error messages generated by database input validation failures. Specifically, when a user inputs data that triggers a database error (e.g., submitting a string where an integer is expected), the error message includes this unsanitized input and is rendered directly in the web interface without proper HTML escaping. This improper neutralization of input (CWE-79) allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser session. The vulnerability requires the attacker to have low privileges (authenticated user) and to trick a user into triggering the error message (user interaction required). The CVSS 3.1 base score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, requirement for privileges and user interaction, and partial confidentiality and integrity impacts without availability impact. No known exploits have been reported in the wild as of the publication date. The vendor fixed the issue in version 2025.8 by properly sanitizing error message outputs. Organizations running vulnerable versions should upgrade promptly to mitigate risk.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions within the FacturaScripts application. Given FacturaScripts' role in financial and accounting processes, such attacks could facilitate fraud or data leakage. Although availability is not impacted, the trustworthiness of financial data and user accounts could be compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or where social engineering is feasible. Organizations in Europe with extensive SME sectors relying on FacturaScripts for ERP and accounting functions are at heightened risk. The absence of known exploits suggests limited active targeting currently, but the vulnerability remains exploitable until patched.
Mitigation Recommendations
The primary mitigation is to upgrade FacturaScripts to version 2025.8 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict input validation and sanitization at the application and database layers to prevent injection of malicious input that triggers error messages. Web application firewalls (WAFs) can be configured to detect and block suspicious input patterns that may exploit this XSS flaw. Educate users to avoid interacting with suspicious links or inputs that could trigger error messages. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Regularly audit and monitor application logs for unusual error message patterns or signs of attempted exploitation. Finally, ensure secure coding practices are followed in customizations or plugins to avoid similar issues.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T15:47:41.626Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813004f9fa50a62f63a3ab
Added to database: 2/2/2026, 11:15:16 PM
Last enriched: 2/10/2026, 11:09:45 AM
Last updated: 3/25/2026, 1:43:02 AM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.