CVE-2025-67082
📋 TL;DR
An authenticated SQL injection vulnerability in InvoicePlane allows attackers to extract arbitrary data from the database by manipulating report generation parameters. This affects all InvoicePlane installations up to version 1.6.3 where users have report generation privileges.
💻 Affected Systems
- InvoicePlane
📦 What is this software?
Invoiceplane by Invoiceplane
⚠️ Risk & Real-World Impact
Worst Case
Complete database compromise including sensitive financial data, client information, and authentication credentials leading to full system takeover.
Likely Case
Extraction of invoice data, client records, and potentially user credentials from the database.
If Mitigated
Limited data exposure if database permissions are properly segmented and sensitive data is encrypted.
🎯 Exploit Status
Error-based SQL injection with clear parameter manipulation; requires authenticated access.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.6.4 or later
Vendor Advisory: https://github.com/InvoicePlane/InvoicePlane
Restart Required: No
Instructions:
1. Backup your InvoicePlane installation and database. 2. Download the latest version from GitHub. 3. Replace the existing files with the patched version. 4. Clear application cache if applicable.
🔧 Temporary Workarounds
Input Validation Filter
allAdd server-side validation to reject non-numeric values in maxQuantity and minQuantity parameters
Modify report generation code to validate parameters as integers before processing
WAF Rule
allImplement web application firewall rules to block SQL injection patterns in report parameters
Add WAF rule to detect and block SQL keywords in maxQuantity and minQuantity parameters
🧯 If You Can't Patch
- Restrict report generation permissions to only essential users
- Implement database-level controls to limit query execution and segregate sensitive data
🔍 How to Verify
Check if Vulnerable:
Check if InvoicePlane version is 1.6.3 or earlier and test report generation with SQL injection payloads in quantity parameters
Check Version:
Check the version number in the InvoicePlane admin interface or application files
Verify Fix Applied:
Verify installation is version 1.6.4 or later and test that SQL injection attempts in quantity parameters are properly rejected
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL error messages in application logs
- Multiple failed report generation attempts with unusual parameters
Network Indicators:
- HTTP requests containing SQL keywords in maxQuantity or minQuantity parameters
SIEM Query:
source="web_logs" AND (uri_query="*maxQuantity=*'*" OR uri_query="*minQuantity=*'*")