logo

Database

Server side cross-site scripting In invoiceninja/invoiceninja

Description

Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice Line Items

Vulnerability Details

Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal.

The line item description field was not passed through purify::clean() before rendering.

Steps to Reproduce

    Login as any authenticated user

    Create or edit an invoice

    In a line item description, enter: <img src=x onerror=alert(document.cookie)>

    Save the invoice and preview it

    The XSS payload executes in the browser

Impact

    Attacker: Any authenticated user who can create invoices

    Victim: Any user viewing the invoice (including clients via the portal)

    Specific damage: Session hijacking, account takeover, data exfiltration

Proposed Fix

Fixed in v5.13.4 by the vendor by adding purify::clean() to sanitize line item descriptions.

Mitigation

Update Impact

Minimal update. May introduce new vulnerabilities or breaking changes.

Ecosystem
Package
Affected version
Patched versions