Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23476: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts

0
Medium
VulnerabilityCVE-2026-23476cvecve-2026-23476cwe-79
Published: Mon Feb 02 2026 (02/02/2026, 20:49:05 UTC)
Source: CVE Database V5
Vendor/Project: NeoRazorX
Product: facturascripts

Description

CVE-2026-23476 is a reflected cross-site scripting (XSS) vulnerability in FacturaScripts, an open-source ERP and accounting software by NeoRazorX, affecting versions prior to 2025. 8. The flaw arises from improper sanitization when displaying error messages triggered by database input errors, due to the use of Twig's | raw filter which bypasses HTML escaping. An attacker can exploit this by causing a database error with crafted input, leading to execution of malicious scripts in the victim's browser. The vulnerability requires low privileges but does require user interaction and results in partial confidentiality and integrity impact without affecting availability. It is rated medium severity with a CVSS score of 5. 4 and has no known exploits in the wild. The issue is fixed in version 2025. 8. European organizations using vulnerable versions of FacturaScripts, especially in finance and accounting roles, should prioritize patching to prevent potential targeted attacks.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/10/2026, 11:09:45 UTC

Technical Analysis

FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises. CVE-2026-23476 is a reflected cross-site scripting vulnerability identified in versions prior to 2025.8. The root cause is the use of Twig's | raw filter when rendering error messages generated by database input validation failures. Specifically, when a user inputs data that triggers a database error (e.g., submitting a string where an integer is expected), the error message includes this unsanitized input and is rendered directly in the web interface without proper HTML escaping. This improper neutralization of input (CWE-79) allows an attacker to inject malicious JavaScript code that executes in the context of the victim's browser session. The vulnerability requires the attacker to have low privileges (authenticated user) and to trick a user into triggering the error message (user interaction required). The CVSS 3.1 base score is 5.4 (medium severity), reflecting the network attack vector, low attack complexity, requirement for privileges and user interaction, and partial confidentiality and integrity impacts without availability impact. No known exploits have been reported in the wild as of the publication date. The vendor fixed the issue in version 2025.8 by properly sanitizing error message outputs. Organizations running vulnerable versions should upgrade promptly to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality and integrity of user sessions and data. Exploitation could allow attackers to execute arbitrary scripts in users' browsers, potentially leading to session hijacking, credential theft, or unauthorized actions within the FacturaScripts application. Given FacturaScripts' role in financial and accounting processes, such attacks could facilitate fraud or data leakage. Although availability is not impacted, the trustworthiness of financial data and user accounts could be compromised. The requirement for authenticated access and user interaction limits the attack surface but does not eliminate risk, especially in environments with many users or where social engineering is feasible. Organizations in Europe with extensive SME sectors relying on FacturaScripts for ERP and accounting functions are at heightened risk. The absence of known exploits suggests limited active targeting currently, but the vulnerability remains exploitable until patched.

Mitigation Recommendations

The primary mitigation is to upgrade FacturaScripts to version 2025.8 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should implement strict input validation and sanitization at the application and database layers to prevent injection of malicious input that triggers error messages. Web application firewalls (WAFs) can be configured to detect and block suspicious input patterns that may exploit this XSS flaw. Educate users to avoid interacting with suspicious links or inputs that could trigger error messages. Limit user privileges to the minimum necessary to reduce the risk of exploitation by low-privilege attackers. Regularly audit and monitor application logs for unusual error message patterns or signs of attempted exploitation. Finally, ensure secure coding practices are followed in customizations or plugins to avoid similar issues.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-13T15:47:41.626Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69813004f9fa50a62f63a3ab

Added to database: 2/2/2026, 11:15:16 PM

Last enriched: 2/10/2026, 11:09:45 AM

Last updated: 3/25/2026, 1:43:02 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses