CVE-2025-0474
📋 TL;DR
Invoice Ninja versions 5.8.56 through 5.11.23 contain an authenticated Server-Side Request Forgery (SSRF) vulnerability that allows authenticated users to read arbitrary files and make network requests from the application server. This could lead to data exposure, internal network reconnaissance, or further attacks. Only authenticated users can exploit this vulnerability.
💻 Affected Systems
- Invoice Ninja
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could read sensitive files (configuration files, credentials), access internal services, pivot to internal networks, or combine with other vulnerabilities for remote code execution.
Likely Case
Authenticated malicious users or compromised accounts reading sensitive files, accessing metadata services, or scanning internal network resources.
If Mitigated
Limited to authenticated users only, with network segmentation preventing access to critical internal resources.
🎯 Exploit Status
Requires authenticated access. Exploitation involves crafting specific requests to trigger SSRF.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.11.24 and later
Vendor Advisory: https://github.com/invoiceninja/invoiceninja/commit/2a9bf353b432d7060e85487b617151ecbc36247d
Restart Required: No
Instructions:
1. Update Invoice Ninja to version 5.11.24 or later. 2. Apply the patch commit 2a9bf353b432d7060e85487b617151ecbc36247d if updating is not possible. 3. Clear any caches and verify the fix.
🔧 Temporary Workarounds
Network Segmentation
allRestrict outbound network access from Invoice Ninja servers to only necessary services.
Input Validation
allImplement additional input validation for URL parameters in custom configurations.
🧯 If You Can't Patch
- Implement strict network egress filtering to prevent SSRF requests to internal resources
- Reduce user privileges and implement least privilege access controls
🔍 How to Verify
Check if Vulnerable:
Check Invoice Ninja version in admin panel or via composer show invoiceninja/invoiceninja
Check Version:
composer show invoiceninja/invoiceninja | grep version
Verify Fix Applied:
Verify version is 5.11.24 or later and check that the patch commit is applied
📡 Detection & Monitoring
Log Indicators:
- Unusual outbound HTTP requests from application server
- Requests to internal IP addresses or file:// schemes
- Multiple failed attempts to access restricted URLs
Network Indicators:
- Outbound requests from Invoice Ninja server to unexpected internal services
- Requests to metadata services (169.254.169.254, etc.)
SIEM Query:
source="invoice-ninja" AND (url="file://*" OR dst_ip=private_ip_range OR dst_ip=169.254.169.254)