CVE-2026-25514: CWE-20: Improper Input Validation in NeoRazorX facturascripts
CVE-2026-25514 is a critical SQL injection vulnerability in FacturaScripts ERP software versions prior to 2025. 81. It affects the autocomplete functionality where user input is unsafely concatenated into SQL queries without proper sanitization or parameterization. Authenticated attackers can exploit this flaw to extract sensitive database information including user credentials, configuration data, and business records. The vulnerability stems from improper input validation in the CodeModel::all() method. No user interaction beyond authentication is needed, and the vulnerability has a high CVSS score of 8. 7. Although no exploits are currently known in the wild, the impact on confidentiality, integrity, and availability is severe. The issue has been patched in version 2025. 81.
AI Analysis
Technical Summary
FacturaScripts, an open-source ERP and accounting software developed by NeoRazorX, contains a critical SQL injection vulnerability identified as CVE-2026-25514. This vulnerability exists in versions prior to 2025.81 within the autocomplete feature, specifically in the CodeModel::all() method. The root cause is improper input validation (CWE-20) combined with unsafe SQL query construction (CWE-89, CWE-943), where user-supplied parameters are directly concatenated into SQL statements without sanitization or use of parameterized queries. An attacker with valid authentication credentials can exploit this flaw to perform unauthorized SQL queries, enabling extraction of sensitive data such as user credentials, configuration settings, and all stored business data. The vulnerability requires no additional user interaction and can be exploited remotely over the network (AV:N). The CVSS 4.0 vector indicates low attack complexity, no privileges beyond authentication required, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported, the vulnerability poses a significant risk to organizations relying on FacturaScripts for critical business operations. The vendor has addressed the issue in version 2025.81 by implementing proper input validation and parameterized query handling.
Potential Impact
For European organizations, exploitation of CVE-2026-25514 could lead to severe data breaches involving sensitive business and user information, potentially resulting in financial loss, reputational damage, and regulatory penalties under GDPR. The compromise of user credentials could enable further lateral movement within networks, escalating the attack impact. Integrity of financial and operational data could be undermined, affecting business continuity and decision-making. Availability may also be impacted if attackers manipulate or delete critical data. Given FacturaScripts’ use in small to medium enterprises across Europe for accounting and ERP functions, the vulnerability threatens a broad range of sectors including manufacturing, retail, and services. The high severity and ease of exploitation make timely patching essential to prevent exploitation and mitigate risks.
Mitigation Recommendations
European organizations using FacturaScripts should immediately upgrade to version 2025.81 or later where the vulnerability is patched. Until upgrade is possible, restrict access to the FacturaScripts application to trusted users and networks only, employing network segmentation and strong authentication controls. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the autocomplete functionality. Conduct thorough audits of user privileges to minimize the number of accounts with access to the vulnerable functionality. Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. Educate users about the importance of using strong, unique credentials to reduce risk from credential compromise. Finally, ensure regular backups of business data are performed and tested to enable recovery in case of data integrity or availability issues.
Affected Countries
Germany, France, United Kingdom, Spain, Italy, Netherlands, Belgium, Poland
CVE-2026-25514: CWE-20: Improper Input Validation in NeoRazorX facturascripts
Description
CVE-2026-25514 is a critical SQL injection vulnerability in FacturaScripts ERP software versions prior to 2025. 81. It affects the autocomplete functionality where user input is unsafely concatenated into SQL queries without proper sanitization or parameterization. Authenticated attackers can exploit this flaw to extract sensitive database information including user credentials, configuration data, and business records. The vulnerability stems from improper input validation in the CodeModel::all() method. No user interaction beyond authentication is needed, and the vulnerability has a high CVSS score of 8. 7. Although no exploits are currently known in the wild, the impact on confidentiality, integrity, and availability is severe. The issue has been patched in version 2025. 81.
AI-Powered Analysis
Technical Analysis
FacturaScripts, an open-source ERP and accounting software developed by NeoRazorX, contains a critical SQL injection vulnerability identified as CVE-2026-25514. This vulnerability exists in versions prior to 2025.81 within the autocomplete feature, specifically in the CodeModel::all() method. The root cause is improper input validation (CWE-20) combined with unsafe SQL query construction (CWE-89, CWE-943), where user-supplied parameters are directly concatenated into SQL statements without sanitization or use of parameterized queries. An attacker with valid authentication credentials can exploit this flaw to perform unauthorized SQL queries, enabling extraction of sensitive data such as user credentials, configuration settings, and all stored business data. The vulnerability requires no additional user interaction and can be exploited remotely over the network (AV:N). The CVSS 4.0 vector indicates low attack complexity, no privileges beyond authentication required, and high impact on confidentiality, integrity, and availability. Although no public exploits have been reported, the vulnerability poses a significant risk to organizations relying on FacturaScripts for critical business operations. The vendor has addressed the issue in version 2025.81 by implementing proper input validation and parameterized query handling.
Potential Impact
For European organizations, exploitation of CVE-2026-25514 could lead to severe data breaches involving sensitive business and user information, potentially resulting in financial loss, reputational damage, and regulatory penalties under GDPR. The compromise of user credentials could enable further lateral movement within networks, escalating the attack impact. Integrity of financial and operational data could be undermined, affecting business continuity and decision-making. Availability may also be impacted if attackers manipulate or delete critical data. Given FacturaScripts’ use in small to medium enterprises across Europe for accounting and ERP functions, the vulnerability threatens a broad range of sectors including manufacturing, retail, and services. The high severity and ease of exploitation make timely patching essential to prevent exploitation and mitigate risks.
Mitigation Recommendations
European organizations using FacturaScripts should immediately upgrade to version 2025.81 or later where the vulnerability is patched. Until upgrade is possible, restrict access to the FacturaScripts application to trusted users and networks only, employing network segmentation and strong authentication controls. Implement web application firewalls (WAFs) with custom rules to detect and block SQL injection patterns targeting the autocomplete functionality. Conduct thorough audits of user privileges to minimize the number of accounts with access to the vulnerable functionality. Monitor logs for unusual database queries or access patterns indicative of exploitation attempts. Educate users about the importance of using strong, unique credentials to reduce risk from credential compromise. Finally, ensure regular backups of business data are performed and tested to enable recovery in case of data integrity or availability issues.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-02T18:21:42.487Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983a8cef9fa50a62fa9fe91
Added to database: 2/4/2026, 8:15:10 PM
Last enriched: 2/4/2026, 8:29:32 PM
Last updated: 2/4/2026, 11:07:23 PM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22038: CWE-532: Insertion of Sensitive Information into Log File in Significant-Gravitas AutoGPT
HighCVE-2026-1894: Improper Authorization in WeKan
MediumCVE-2025-62616: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2025-62615: CWE-918: Server-Side Request Forgery (SSRF) in Significant-Gravitas AutoGPT
CriticalCVE-2026-25585: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in InternationalColorConsortium iccDEV
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.