CVE-2025-67083

5.3 MEDIUM

📋 TL;DR

CVE-2025-67083 is a directory traversal vulnerability in InvoicePlane that allows unauthenticated attackers to read arbitrary files from the server. The impact depends on web server configuration and permissions, potentially exposing sensitive data. All InvoicePlane installations through version 1.6.3 are affected.

💻 Affected Systems

Products:
  • InvoicePlane
Versions: through 1.6.3
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default installation. Impact depends on web server configuration and file permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers read sensitive files like configuration files, database credentials, or system files, leading to full system compromise or data breach.

🟠

Likely Case

Attackers read application configuration files containing database credentials or other sensitive information, enabling further attacks.

🟢

If Mitigated

Limited file access due to proper web server permissions and directory restrictions, exposing only non-sensitive files.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal attacks are well-understood and easy to automate. Public advisory includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.6.4 or later

Vendor Advisory: https://github.com/InvoicePlane/InvoicePlane

Restart Required: No

Instructions:

1. Backup your InvoicePlane installation and database. 2. Download InvoicePlane 1.6.4 or later from GitHub. 3. Replace all files except uploads and custom configuration. 4. Verify installation works correctly.

🔧 Temporary Workarounds

Web Server Path Restriction

all

Configure web server to restrict access to parent directories

# Apache: Ensure Directory directives restrict parent traversal
# Nginx: Use location blocks with proper path validation

File Permission Hardening

linux

Restrict read permissions on sensitive files

chmod 600 config/database.php
chmod 600 .env
chmod 600 other sensitive config files

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block directory traversal patterns
  • Isolate InvoicePlane instance behind reverse proxy with strict path validation

🔍 How to Verify

Check if Vulnerable:

Check if InvoicePlane version is 1.6.3 or earlier. Attempt to access files outside web root using ../ sequences in URLs.

Check Version:

Check includes/version.php or view footer in InvoicePlane admin interface

Verify Fix Applied:

Verify version is 1.6.4 or later. Test directory traversal attempts return proper errors instead of file contents.

📡 Detection & Monitoring

Log Indicators:

  • Multiple requests with ../ patterns
  • Access to unusual file paths in web logs
  • Failed attempts to access sensitive files

Network Indicators:

  • HTTP requests containing ../ sequences
  • Unusual file extensions in GET parameters

SIEM Query:

web.url:*../* AND (web.status:200 OR web.status:403) AND dest.app:"InvoicePlane"

🔗 References

📤 Share & Export