Описание
FacturaScripts has Stored Cross-Site Scripting (XSS) in "Observations" field via History View
Summary
A Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where historical data is rendered without proper HTML entity encoding. This allows an attacker to execute arbitrary JavaScript in the browser of viewing the history by administrators.
Details
When an administrator views the History tab of that specific note, the script executes in their browser session.
PoC
-
Log in as a regular user.
-
Open "Sales"=>"Customers"=> "Delivery Notes"
-
Chose one of the customer or create the new one.
-
Open "Delivery notes"
-
Create a new Delivery Note or edit an existing one. Fill the "Number 2" field with any value and save.
Result: Upon opening the history record, the onerror event triggers, executing the JavaScript and displaying an alert box with the application's origin.
Impact
Change admin password via XSS:
Admin password was changed
This vulnerability results in a Critical Full Account Takeover, allowing any user with note-editing permissions to seize control of the admin account. It successfully bypasses CSRF protections and exploits the lack of "current password" verification during credential changes. Once compromised, the attacker gains total access to the system's management, sensitive financial data, and user configurations.
Technical requirements & Complexity
The attack requires prior technical knowledge of the internal API structure (field names and required values), which can be obtained by a legitimate user through browser developer tools. While it requires the target's code (e.g., admin), this is a common default value in most installations.
Пакеты
facturascripts/facturascripts
<= 2025.71
Отсутствует
Связанные уязвимости
FacturaScripts is open-source enterprise resource planning and accounting software. In 2025.71 and earlier, a Stored Cross-Site Scripting (XSS) vulnerability was discovered in the Observations field. The flaw occurs in the History view, where historical data is rendered without proper HTML entity encoding. This allows an attacker to execute arbitrary JavaScript in the browser of viewing the history by administrators.