Описание
FacturaScripts is Vulnerable to Reflected XSS
Reflected XSS via SQL Error Messages
Summary
A reflected XSS bug has been found in FacturaScripts. The problem is in how error messages get displayed - it's using Twig's | raw filter which skips HTML escaping. When a database error is triggered (like passing a string where an integer is expected), the error message includes all input and gets rendered without sanitization.
Attackers can use this to phish credentials from other users since HttpOnly is set on cookies (so stealing cookies directly won't work, but attackers can inject a fake login form).
CVSS 6.1 (Medium-High)
What was Found
Where the bug exists in the code:
Core/View/Macro/Utils.html.twig, line 27:
That | raw is the problem. It tells Twig not to escape anything.
How it works
So here's what happens:
- Hhit
/EditProducto?code=<svg onload=alert(1)> or <img src=x onerror=alert(1)> - The app tries to look up a product with that "code"
- PostgreSQL throws an error because
<svg onload=alert(1)>isn't a valid integer - The error goes something like: ```
ERROR: invalid input syntax for type integer: ""
LINE 1: SELECT * FROM "productos" WHERE "idproducto" = '
"
Загрузка...
- This gets logged via MiniLog and displayed to the user
- Because of
| raw, the browser actually executes the JS
The error logging happens in Core/Base/DataBase.php around line 236:
And PostgreSQL's error message includes whatever garbage it was sent.
Reproduction Steps
Requirements
- Working FacturaScripts install
- Any user account (doesn't need to be admin)
- The victim needs to be logged in
Quick test
Just visit this URL while logged in:
An alert box should pop up.
For a real attack (credential phishing)
Set up a simple server to catch credentials:
Then craft a URL that injects a fake login form:
Send that to someone (email, chat, whatever). When they click it and enter their password thinking their session expired, their creds are displayed.
Other endpoints that work
Pretty much anything that uses the code parameter:
/EditProducto?code=/EditCliente?code=/EditFacturaCliente?code=/EditProveedor?code=- etc.
Basically all the Edit controllers.
Impact
What attackers can do with this
Steal credentials - Can't grab cookies directly (HttpOnly), but the phishing form trick works great. Victim thinks their session timed out and re-enters their password.
Read page data - Once JS is running, attackers can scrape whatever's on the page (invoices, customer info, financial data) and send it somewhere.
Keylog - Inject a keylogger that captures everything they type.
Bypass CSRF - Grab the multireqtoken from the page and make requests as the victim.
What attackers CAN'T do
Can't steal session cookies via document.cookie - they're HttpOnly.
Business side
This is a financial app, so if attackers compromise an admin account, the following is possible to create or expose:
- Fake invoices
- Redirected payments
- Customer data breach (GDPR stuff)
- The usual mess
Fix
Quick fix
Just remove | raw from line 27 in Core/View/Macro/Utils.html.twig:
That's it. Twig escapes by default, so removing | raw fixes the XSS.
If projects want to be thorough
- Sanitize messages before they go into the log:
-
Add CSP headers to block inline scripts as a backup
-
Maybe validate the
codeparameter format before it hits the database
Resources
- https://cwe.mitre.org/data/definitions/79.html
- https://cheatsheetseries.owasp.org/cheatsheets/Cross_Site_Scripting_Prevention_Cheat_Sheet.html
Found: Dec 31, 2025
Tested on: FacturaScripts 2025.61 (Docker), verified vulnerable in 2025.71 (GitHub latest)
Пакеты
facturascripts/facturascripts
< 2025.81
2025.81
Связанные уязвимости
FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8.