CVE-2025-69210

5.4 MEDIUM

📋 TL;DR

FacturaScripts versions before 2025.7 contain a stored cross-site scripting (XSS) vulnerability in the file upload functionality. Authenticated users can upload malicious XML files containing JavaScript that executes when viewed by administrators. This allows attackers to perform actions within administrators' browser sessions.

💻 Affected Systems

Products:
  • FacturaScripts
Versions: All versions prior to 2025.7
Operating Systems: All platforms running FacturaScripts
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user access to upload files

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Administrator account compromise leading to full system takeover, data theft, or ransomware deployment

🟠

Likely Case

Session hijacking, data exfiltration, or privilege escalation within the application

🟢

If Mitigated

Limited to authenticated user access with proper input validation and output encoding

🌐 Internet-Facing: HIGH if application is publicly accessible, as authenticated users can exploit it
🏢 Internal Only: HIGH as authenticated internal users can target administrators

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated user access and knowledge of XML file crafting with JavaScript payloads

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2025.7

Vendor Advisory: https://github.com/NeoRazorX/facturascripts/security/advisories/GHSA-2267-xqcf-gw2m

Restart Required: Yes

Instructions:

1. Backup your FacturaScripts installation and database. 2. Download version 2025.7 from the official repository. 3. Replace existing files with the new version. 4. Restart your web server. 5. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable file uploads for non-admin users

all

Restrict file upload permissions to administrator accounts only

Modify user role permissions in FacturaScripts admin panel

Implement web application firewall rules

all

Block XML file uploads containing JavaScript patterns

Configure WAF to detect and block malicious file uploads

🧯 If You Can't Patch

  • Implement strict content-type validation for uploaded files
  • Apply output encoding when rendering uploaded file contents

🔍 How to Verify

Check if Vulnerable:

Check FacturaScripts version in admin panel or by examining source files

Check Version:

Check admin panel or view core/version.php file

Verify Fix Applied:

Confirm version is 2025.7 or later and test file upload functionality with malicious payloads

📡 Detection & Monitoring

Log Indicators:

  • Multiple XML file uploads from single user
  • Large file uploads with unusual content patterns

Network Indicators:

  • POST requests to upload endpoints with XML content
  • Subsequent requests to access uploaded files

SIEM Query:

source="web_server" AND (uri_path="/upload" OR method="POST") AND file_extension="xml"

🔗 References

📤 Share & Export