CVE-2026-23476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
AI Analysis
Technical Summary
FacturaScripts is an open-source ERP and accounting platform widely used by small and medium enterprises. CVE-2026-23476 is a reflected Cross-Site Scripting (XSS) vulnerability identified in versions prior to 2025.8. The root cause lies in the way error messages are displayed when database errors occur, such as when a string is passed where an integer is expected. FacturaScripts uses the Twig templating engine, and specifically applies the | raw filter to error messages, which bypasses HTML escaping. Consequently, malicious input included in the error message is rendered directly in the browser, enabling an attacker to inject arbitrary JavaScript code. Exploitation requires an attacker to induce a database error by submitting crafted input, and a victim user must interact with the malicious link or input. The vulnerability affects confidentiality and integrity by allowing theft of session cookies, credentials, or execution of unauthorized actions in the context of the victim user. Availability is not impacted. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, requires low privileges and user interaction, with a scope change due to potential impact beyond the vulnerable component. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and fixed in version 2025.8. Organizations running older versions remain at risk.
Potential Impact
For European organizations, especially SMEs relying on FacturaScripts for ERP and accounting, this vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed under the victim's user context. This can lead to data breaches involving sensitive financial and business information, undermining confidentiality and integrity. While the vulnerability does not affect availability, the potential for lateral movement or privilege escalation exists if attackers leverage stolen credentials. The reflected XSS nature means phishing or social engineering could be used to trick users into triggering the exploit. Given the widespread use of FacturaScripts in Europe, particularly in countries with strong SME sectors, the impact could be significant in terms of financial data exposure and compliance risks under GDPR. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
Organizations should immediately upgrade FacturaScripts to version 2025.8 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement web application firewall (WAF) rules to detect and block suspicious inputs that could trigger database errors or contain script tags. Review and harden input validation and error handling mechanisms to ensure no user input is rendered without proper sanitization. Educate users about the risks of clicking on untrusted links or inputs that could trigger reflected XSS attacks. Monitor logs for unusual error message patterns or repeated database errors that may indicate exploitation attempts. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of potential XSS. Regularly audit and update third-party components and dependencies to maintain security hygiene.
Affected Countries
Spain, Germany, France, Italy, Netherlands
CVE-2026-23476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
Description
FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
AI-Powered Analysis
Technical Analysis
FacturaScripts is an open-source ERP and accounting platform widely used by small and medium enterprises. CVE-2026-23476 is a reflected Cross-Site Scripting (XSS) vulnerability identified in versions prior to 2025.8. The root cause lies in the way error messages are displayed when database errors occur, such as when a string is passed where an integer is expected. FacturaScripts uses the Twig templating engine, and specifically applies the | raw filter to error messages, which bypasses HTML escaping. Consequently, malicious input included in the error message is rendered directly in the browser, enabling an attacker to inject arbitrary JavaScript code. Exploitation requires an attacker to induce a database error by submitting crafted input, and a victim user must interact with the malicious link or input. The vulnerability affects confidentiality and integrity by allowing theft of session cookies, credentials, or execution of unauthorized actions in the context of the victim user. Availability is not impacted. The CVSS 3.1 vector is AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, requires low privileges and user interaction, with a scope change due to potential impact beyond the vulnerable component. No known exploits have been reported in the wild, but the vulnerability is publicly disclosed and fixed in version 2025.8. Organizations running older versions remain at risk.
Potential Impact
For European organizations, especially SMEs relying on FacturaScripts for ERP and accounting, this vulnerability poses a risk of session hijacking, credential theft, and unauthorized actions performed under the victim's user context. This can lead to data breaches involving sensitive financial and business information, undermining confidentiality and integrity. While the vulnerability does not affect availability, the potential for lateral movement or privilege escalation exists if attackers leverage stolen credentials. The reflected XSS nature means phishing or social engineering could be used to trick users into triggering the exploit. Given the widespread use of FacturaScripts in Europe, particularly in countries with strong SME sectors, the impact could be significant in terms of financial data exposure and compliance risks under GDPR. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.
Mitigation Recommendations
Organizations should immediately upgrade FacturaScripts to version 2025.8 or later, where the vulnerability is patched. If upgrading is not immediately feasible, implement web application firewall (WAF) rules to detect and block suspicious inputs that could trigger database errors or contain script tags. Review and harden input validation and error handling mechanisms to ensure no user input is rendered without proper sanitization. Educate users about the risks of clicking on untrusted links or inputs that could trigger reflected XSS attacks. Monitor logs for unusual error message patterns or repeated database errors that may indicate exploitation attempts. Consider deploying Content Security Policy (CSP) headers to restrict script execution sources, mitigating the impact of potential XSS. Regularly audit and update third-party components and dependencies to maintain security hygiene.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-13T15:47:41.626Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813004f9fa50a62f63a3ab
Added to database: 2/2/2026, 11:15:16 PM
Last enriched: 2/2/2026, 11:33:05 PM
Last updated: 2/7/2026, 12:00:55 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.