FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.
References
| Link | Resource |
|---|---|
| https://github.com/NeoRazorX/facturascripts/commit/2afd98cecd26c5f8357e0e321d86063ad1012fc3 | Patch |
| https://github.com/NeoRazorX/facturascripts/releases/tag/v2025.8 | Release Notes |
| https://github.com/NeoRazorX/facturascripts/security/advisories/GHSA-g6w2-q45f-xrp4 | Exploit Vendor Advisory Mitigation |
Configurations
History
23 Feb 2026, 15:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/NeoRazorX/facturascripts/commit/2afd98cecd26c5f8357e0e321d86063ad1012fc3 - Patch | |
| References | () https://github.com/NeoRazorX/facturascripts/releases/tag/v2025.8 - Release Notes | |
| References | () https://github.com/NeoRazorX/facturascripts/security/advisories/GHSA-g6w2-q45f-xrp4 - Exploit, Vendor Advisory, Mitigation | |
| Summary |
|
|
| First Time |
Facturascripts
Facturascripts facturascripts |
|
| CPE | cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:* |
02 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-02 23:16
Updated : 2026-02-23 15:32
NVD link : CVE-2026-23476
Mitre link : CVE-2026-23476
CVE.ORG link : CVE-2026-23476
JSON object : View
Products Affected
facturascripts
- facturascripts
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
