Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25514: CWE-20: Improper Input Validation in NeoRazorX facturascripts

0
High
VulnerabilityCVE-2026-25514cvecve-2026-25514cwe-20cwe-89cwe-943
Published: Wed Feb 04 2026 (02/04/2026, 19:59:54 UTC)
Source: CVE Database V5
Vendor/Project: NeoRazorX
Product: facturascripts

Description

CVE-2026-25514 is a critical SQL injection vulnerability in FacturaScripts versions prior to 2025. 81, affecting the autocomplete functionality. It allows authenticated attackers to execute arbitrary SQL queries by exploiting improper input validation in the CodeModel::all() method, leading to potential extraction of sensitive data such as user credentials, configuration settings, and business data. The vulnerability requires authentication but no user interaction and has a high CVSS score of 8. 7. Although no known exploits are reported in the wild yet, the impact on confidentiality, integrity, and availability is significant. The issue has been patched in version 2025. 81. European organizations using FacturaScripts should prioritize updating to the patched version and implement strict input validation and database query parameterization to mitigate risks. Countries with higher adoption of FacturaScripts and significant SME sectors relying on ERP/accounting software are more likely to be affected.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:43:43 UTC

Technical Analysis

FacturaScripts is an open-source ERP and accounting software widely used by small and medium enterprises for managing business processes. CVE-2026-25514 is a critical SQL injection vulnerability found in versions prior to 2025.81, specifically in the autocomplete feature implemented in the CodeModel::all() method. The root cause is improper input validation where user-supplied parameters are directly concatenated into SQL queries without sanitization or use of parameterized queries, violating secure coding practices (CWE-20, CWE-89, CWE-943). An authenticated attacker can exploit this flaw to inject malicious SQL commands, enabling unauthorized extraction of sensitive data including user credentials, configuration details, and all stored business data. The vulnerability does not require user interaction but does require the attacker to have valid credentials, which lowers the attack complexity but still poses a high risk due to the extensive data exposure possible. The vulnerability has been assigned a CVSS 4.0 base score of 8.7, reflecting its high impact on confidentiality, integrity, and availability. Although no active exploitation has been reported, the critical nature of the flaw and the sensitive data involved necessitate immediate remediation. The vendor has addressed the issue in version 2025.81 by implementing proper input validation and parameterized queries to prevent SQL injection.

Potential Impact

For European organizations, especially SMEs relying on FacturaScripts for ERP and accounting, this vulnerability poses a significant risk of data breach and operational disruption. Exploitation could lead to unauthorized disclosure of sensitive business information, including financial records and user credentials, potentially resulting in financial loss, reputational damage, and regulatory non-compliance under GDPR. The integrity of business data could be compromised, affecting decision-making and reporting accuracy. Availability could also be impacted if attackers manipulate database queries to disrupt service. Given the requirement for authentication, insider threats or compromised credentials increase the risk. Organizations in sectors with stringent data protection requirements, such as finance, healthcare, and manufacturing, are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

European organizations should immediately upgrade FacturaScripts to version 2025.81 or later to apply the official patch. In addition, implement multi-factor authentication (MFA) to reduce the risk of credential compromise. Conduct thorough audits of user access rights to limit authenticated users to necessary privileges only. Employ Web Application Firewalls (WAFs) with SQL injection detection rules tailored to FacturaScripts’ query patterns to provide an additional layer of defense. Review and harden database permissions to restrict the scope of potential SQL injection impacts. Regularly monitor logs for unusual query patterns or data access anomalies indicative of exploitation attempts. Educate users about credential security and monitor for compromised accounts. Finally, consider deploying runtime application self-protection (RASP) solutions that can detect and block injection attacks in real time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-02T18:21:42.487Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6983a8cef9fa50a62fa9fe91

Added to database: 2/4/2026, 8:15:10 PM

Last enriched: 2/12/2026, 7:43:43 AM

Last updated: 3/22/2026, 2:17:46 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses