FacturaScripts vulnerable to Stored Cross-Site Scripting (XSS) via XML File Upload
Description
FacturaScripts is open-source enterprise resource planning and accounting software. Prior to version 2025.7, a stored cross-site scripting (XSS) vulnerability exists in the product file upload functionality. Authenticated users can upload crafted XML files containing executable JavaScript. These files are later rendered by the application without sufficient sanitization or content-type enforcement, allowing arbitrary JavaScript execution when the file is accessed. Because product files uploaded by regular users are visible to administrative users, this vulnerability can be leveraged to execute malicious JavaScript in an administrator’s browser session. Version 2025.7 fixes the issue.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
facturascripts/facturascriptsPackagist | < 2025.7 | 2025.7 |
Affected products
1- Range: 2018.03, 2018.04, 2018.05, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-2267-xqcf-gw2mghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2025-69210ghsaADVISORY
- facturascripts.com/publicaciones/ya-disponible-facturascripts-2025-7ghsax_refsource_MISCWEB
- github.com/NeoRazorX/facturascripts/commit/e908ade21c84bdc9d51190057482316730c66146ghsaWEB
- github.com/NeoRazorX/facturascripts/releases/tag/v2025.7ghsax_refsource_MISCWEB
- github.com/NeoRazorX/facturascripts/security/advisories/GHSA-2267-xqcf-gw2mghsax_refsource_CONFIRMWEB
News mentions
0No linked articles in our index yet.