Directory traversal vulnerability in InvoicePlane through 1.6.3 allows unauthenticated attackers to read files from the server. The ability to read files and the file type depends on the web server and its configuration.
References
| Link | Resource |
|---|---|
| https://github.com/InvoicePlane/InvoicePlane | Product |
| https://www.helx.io/blog/advisory-invoice-plane/ | Exploit Third Party Advisory |
Configurations
History
22 Jan 2026, 16:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:invoiceplane:invoiceplane:*:*:*:*:*:*:*:* | |
| First Time |
Invoiceplane invoiceplane
Invoiceplane |
|
| References | () https://github.com/InvoicePlane/InvoicePlane - Product | |
| References | () https://www.helx.io/blog/advisory-invoice-plane/ - Exploit, Third Party Advisory |
15 Jan 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CWE | CWE-22 |
15 Jan 2026, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-15 15:15
Updated : 2026-01-22 16:03
NVD link : CVE-2025-67083
Mitre link : CVE-2025-67083
CVE.ORG link : CVE-2025-67083
JSON object : View
Products Affected
invoiceplane
- invoiceplane
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
