Server side cross-site scripting In invoiceninja/invoiceninja
Description
Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice Line Items
Vulnerability Details
Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal.
The line item description field was not passed through purify::clean() before rendering.
Steps to Reproduce
Login as any authenticated user
Create or edit an invoice
In a line item description, enter: <img src=x onerror=alert(document.cookie)>
Save the invoice and preview it
The XSS payload executes in the browser
Impact
Attacker: Any authenticated user who can create invoices
Victim: Any user viewing the invoice (including clients via the portal)
Specific damage: Session hijacking, account takeover, data exfiltration
Proposed Fix
Fixed in v5.13.4 by the vendor by adding purify::clean() to sanitize line item descriptions.
Mitigation
Update Impact
Minimal update. May introduce new vulnerabilities or breaking changes.
Ecosystem | Package | Affected version | Patched versions |
|---|---|---|---|
packagist | invoiceninja/invoiceninja | 5.13.4 |
Aliases