Vulnerability Description
InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability occurs in the Edit Quotes functions of InvoicePlane version 1.7.0. In the Editing Quotes function, the application does not validate user input at the quote_number parameter. Although administrator privileges are required to exploit it, this is still considered a critical vulnerability as it can cause actions such as unauthorized modification of application data, creation of persistent backdoors through stored malicious scripts, and full compromise of the application's integrity. Version 1.7.1 patches the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Invoiceplane | Invoiceplane | 1.7.0 |
Related Weaknesses (CWE)
References
- https://github.com/InvoicePlane/InvoicePlane/commit/93622f2df88a860d89bfee56012cPatch
- https://github.com/InvoicePlane/InvoicePlane/security/advisories/GHSA-73x8-gr6v-ExploitMitigationVendor Advisory
FAQ
What is CVE-2026-24746?
CVE-2026-24746 is a vulnerability with a CVSS score of 5.7 (MEDIUM). InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability occurs in the Edit Quotes functions of InvoicePlan...
How severe is CVE-2026-24746?
CVE-2026-24746 has been rated MEDIUM with a CVSS base score of 5.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-24746?
Check the references section above for vendor advisories and patch information. Affected products include: Invoiceplane Invoiceplane.