CVE-2025-0474

7.7 HIGH

📋 TL;DR

Invoice Ninja versions 5.8.56 through 5.11.23 contain an authenticated Server-Side Request Forgery (SSRF) vulnerability that allows authenticated users to read arbitrary files and make network requests from the application server. This could lead to data exposure, internal network reconnaissance, or further attacks. Only authenticated users can exploit this vulnerability.

💻 Affected Systems

Products:
  • Invoice Ninja
Versions: 5.8.56 through 5.11.23
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access. All deployments with affected versions are vulnerable by default.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive files (configuration files, credentials), access internal services, pivot to internal networks, or combine with other vulnerabilities for remote code execution.

🟠

Likely Case

Authenticated malicious users or compromised accounts reading sensitive files, accessing metadata services, or scanning internal network resources.

🟢

If Mitigated

Limited to authenticated users only, with network segmentation preventing access to critical internal resources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access. Exploitation involves crafting specific requests to trigger SSRF.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.11.24 and later

Vendor Advisory: https://github.com/invoiceninja/invoiceninja/commit/2a9bf353b432d7060e85487b617151ecbc36247d

Restart Required: No

Instructions:

1. Update Invoice Ninja to version 5.11.24 or later. 2. Apply the patch commit 2a9bf353b432d7060e85487b617151ecbc36247d if updating is not possible. 3. Clear any caches and verify the fix.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from Invoice Ninja servers to only necessary services.

Input Validation

all

Implement additional input validation for URL parameters in custom configurations.

🧯 If You Can't Patch

  • Implement strict network egress filtering to prevent SSRF requests to internal resources
  • Reduce user privileges and implement least privilege access controls

🔍 How to Verify

Check if Vulnerable:

Check Invoice Ninja version in admin panel or via composer show invoiceninja/invoiceninja

Check Version:

composer show invoiceninja/invoiceninja | grep version

Verify Fix Applied:

Verify version is 5.11.24 or later and check that the patch commit is applied

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from application server
  • Requests to internal IP addresses or file:// schemes
  • Multiple failed attempts to access restricted URLs

Network Indicators:

  • Outbound requests from Invoice Ninja server to unexpected internal services
  • Requests to metadata services (169.254.169.254, etc.)

SIEM Query:

source="invoice-ninja" AND (url="file://*" OR dst_ip=private_ip_range OR dst_ip=169.254.169.254)

🔗 References

📤 Share & Export