CVE-2026-23997: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
CVE-2026-23997 is a high-severity Stored Cross-Site Scripting (XSS) vulnerability affecting FacturaScripts versions 2025. 71 and earlier. The flaw exists in the Observations field within the History view, where user input is rendered without proper HTML entity encoding, allowing attackers to inject and execute arbitrary JavaScript in the browsers of administrators viewing the history. Exploitation requires at least limited privileges to input data and some user interaction to trigger the payload. The vulnerability impacts confidentiality, integrity, and availability by enabling session hijacking, credential theft, or administrative account compromise. No known exploits are currently reported in the wild. European organizations using FacturaScripts for ERP and accounting functions are at risk, especially those with administrators accessing the affected History view. Mitigation requires applying patches once available, implementing strict input validation and output encoding, and restricting access to the History view to trusted users. Countries with significant SME adoption of FacturaScripts, such as Spain, Germany, France, Italy, and the UK, are most likely affected due to market penetration and the strategic importance of ERP systems. Given the CVSS 3.
AI Analysis
Technical Summary
FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises. In versions 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-23997) was identified in the Observations field of the History view. This vulnerability arises because the application fails to properly neutralize user-supplied input by not encoding HTML entities before rendering historical data. Consequently, an attacker with at least limited privileges can inject malicious JavaScript code into the Observations field. When an administrator or authorized user views the History page, the malicious script executes in their browser context. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with administrative privileges. The vulnerability requires some user interaction (viewing the History page) and privileges to input data, but no known public exploits have been reported yet. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring privileges and user interaction. The flaw is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation). No official patches were linked at the time of reporting, so mitigation relies on secure coding practices and access controls until updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of ERP and accounting data managed by FacturaScripts. Successful exploitation can lead to administrative account compromise, enabling attackers to manipulate financial records, exfiltrate sensitive business data, or disrupt operations. The breach of confidentiality and integrity in financial systems can result in regulatory non-compliance, financial losses, and reputational damage. Given the critical role of ERP systems in business processes, availability could also be impacted if attackers leverage the XSS to deploy further attacks such as ransomware or data destruction. Organizations with administrators frequently accessing the History view are particularly vulnerable. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this issue to prevent targeted attacks, especially in sectors with stringent data protection requirements like finance and manufacturing.
Mitigation Recommendations
1. Apply official patches or updates from NeoRazorX as soon as they become available to address the XSS vulnerability directly. 2. Until patches are released, restrict access to the History view to only trusted and essential administrative users to minimize exposure. 3. Implement strict input validation on the Observations field to sanitize and reject potentially malicious input before storage. 4. Employ output encoding techniques, such as HTML entity encoding, when rendering user-supplied data in the History view to prevent script execution. 5. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the application. 6. Conduct regular security audits and penetration testing focused on web application input handling and output encoding. 7. Educate administrators and users about the risks of XSS and encourage cautious behavior when interacting with user-generated content. 8. Monitor logs for unusual activity related to the History view or unexpected script execution attempts. 9. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns as an additional protective layer.
Affected Countries
Spain, Germany, France, Italy, United Kingdom
CVE-2026-23997: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in NeoRazorX facturascripts
Description
CVE-2026-23997 is a high-severity Stored Cross-Site Scripting (XSS) vulnerability affecting FacturaScripts versions 2025. 71 and earlier. The flaw exists in the Observations field within the History view, where user input is rendered without proper HTML entity encoding, allowing attackers to inject and execute arbitrary JavaScript in the browsers of administrators viewing the history. Exploitation requires at least limited privileges to input data and some user interaction to trigger the payload. The vulnerability impacts confidentiality, integrity, and availability by enabling session hijacking, credential theft, or administrative account compromise. No known exploits are currently reported in the wild. European organizations using FacturaScripts for ERP and accounting functions are at risk, especially those with administrators accessing the affected History view. Mitigation requires applying patches once available, implementing strict input validation and output encoding, and restricting access to the History view to trusted users. Countries with significant SME adoption of FacturaScripts, such as Spain, Germany, France, Italy, and the UK, are most likely affected due to market penetration and the strategic importance of ERP systems. Given the CVSS 3.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises. In versions 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability (CVE-2026-23997) was identified in the Observations field of the History view. This vulnerability arises because the application fails to properly neutralize user-supplied input by not encoding HTML entities before rendering historical data. Consequently, an attacker with at least limited privileges can inject malicious JavaScript code into the Observations field. When an administrator or authorized user views the History page, the malicious script executes in their browser context. This can lead to session hijacking, theft of sensitive information, or unauthorized actions performed with administrative privileges. The vulnerability requires some user interaction (viewing the History page) and privileges to input data, but no known public exploits have been reported yet. The CVSS v3.1 base score is 8.0, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and requiring privileges and user interaction. The flaw is categorized under CWE-79 (Improper Neutralization of Input During Web Page Generation). No official patches were linked at the time of reporting, so mitigation relies on secure coding practices and access controls until updates are released.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the security of ERP and accounting data managed by FacturaScripts. Successful exploitation can lead to administrative account compromise, enabling attackers to manipulate financial records, exfiltrate sensitive business data, or disrupt operations. The breach of confidentiality and integrity in financial systems can result in regulatory non-compliance, financial losses, and reputational damage. Given the critical role of ERP systems in business processes, availability could also be impacted if attackers leverage the XSS to deploy further attacks such as ransomware or data destruction. Organizations with administrators frequently accessing the History view are particularly vulnerable. The lack of known exploits in the wild provides a window for proactive mitigation, but the high CVSS score underscores the urgency of addressing this issue to prevent targeted attacks, especially in sectors with stringent data protection requirements like finance and manufacturing.
Mitigation Recommendations
1. Apply official patches or updates from NeoRazorX as soon as they become available to address the XSS vulnerability directly. 2. Until patches are released, restrict access to the History view to only trusted and essential administrative users to minimize exposure. 3. Implement strict input validation on the Observations field to sanitize and reject potentially malicious input before storage. 4. Employ output encoding techniques, such as HTML entity encoding, when rendering user-supplied data in the History view to prevent script execution. 5. Use Content Security Policy (CSP) headers to limit the execution of unauthorized scripts in browsers accessing the application. 6. Conduct regular security audits and penetration testing focused on web application input handling and output encoding. 7. Educate administrators and users about the risks of XSS and encourage cautious behavior when interacting with user-generated content. 8. Monitor logs for unusual activity related to the History view or unexpected script execution attempts. 9. Consider deploying web application firewalls (WAF) with rules targeting XSS attack patterns as an additional protective layer.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-19T18:49:20.658Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69813005f9fa50a62f63a3c8
Added to database: 2/2/2026, 11:15:17 PM
Last enriched: 2/10/2026, 11:12:08 AM
Last updated: 3/25/2026, 1:49:13 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.