VYPR
Low severity3.5NVD Advisory· Published Apr 27, 2026· Updated Apr 29, 2026

CVE-2026-7110

CVE-2026-7110

Description

A flaw has been found in code-projects Invoice System in Laravel 1.0. Affected is an unknown function of the file /item. Executing a manipulation of the argument item name/description can lead to cross site scripting. It is possible to launch the attack remotely. The exploit has been published and may be used.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

DOM-based XSS in code-projects Invoice System in Laravel 1.0 via /item endpoint allows remote attackers to execute arbitrary JavaScript.

Vulnerability

Overview

A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the Invoice System in Laravel 1.0, a project by code-projects [2]. The flaw resides in the invoice item rendering logic, where JavaScript uses innerHTML to inject item names and descriptions into the DOM without sanitization. This allows an attacker to supply malicious payloads via the item name or description fields, leading to script execution in the browser of any user who views the invoice form [1].

Attack

Vector

The vulnerability is remotely exploitable without authentication. An attacker can exploit the /item endpoint to manipulate the item name or description fields. The provided payload "><img src=x onerror=alert(document.domain)> demonstrates how the browser executes arbitrary JavaScript when the malicious content is rendered via innerHTML [1]. No special network position is required; the attack can be carried out by any user able to submit data to the vulnerable endpoint.

Impact

Successful exploitation allows arbitrary JavaScript execution in the context of the application's origin. This can lead to theft of CSRF tokens, session cookies, and unauthorized modification of the invoice form's content in the victim's browser, affecting both confidentiality and integrity [1].

Mitigation

As of this writing, the vulnerability remains unpatched. The recommended mitigations include replacing innerHTML with textContent or innerText, implementing proper output encoding, and using auto-escaping client-side templating [1]. Organizations using this software should apply these fixes or consider alternative solutions until an official patch is released.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

5

News mentions

0

No linked articles in our index yet.