CVE-2025-69210
📋 TL;DR
FacturaScripts versions before 2025.7 contain a stored cross-site scripting (XSS) vulnerability in the file upload functionality. Authenticated users can upload malicious XML files containing JavaScript that executes when viewed by administrators. This allows attackers to perform actions within administrators' browser sessions.
💻 Affected Systems
- FacturaScripts
📦 What is this software?
Facturascripts by Facturascripts
⚠️ Risk & Real-World Impact
Worst Case
Administrator account compromise leading to full system takeover, data theft, or ransomware deployment
Likely Case
Session hijacking, data exfiltration, or privilege escalation within the application
If Mitigated
Limited to authenticated user access with proper input validation and output encoding
🎯 Exploit Status
Exploitation requires authenticated user access and knowledge of XML file crafting with JavaScript payloads
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2025.7
Vendor Advisory: https://github.com/NeoRazorX/facturascripts/security/advisories/GHSA-2267-xqcf-gw2m
Restart Required: Yes
Instructions:
1. Backup your FacturaScripts installation and database. 2. Download version 2025.7 from the official repository. 3. Replace existing files with the new version. 4. Restart your web server. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable file uploads for non-admin users
allRestrict file upload permissions to administrator accounts only
Modify user role permissions in FacturaScripts admin panel
Implement web application firewall rules
allBlock XML file uploads containing JavaScript patterns
Configure WAF to detect and block malicious file uploads
🧯 If You Can't Patch
- Implement strict content-type validation for uploaded files
- Apply output encoding when rendering uploaded file contents
🔍 How to Verify
Check if Vulnerable:
Check FacturaScripts version in admin panel or by examining source files
Check Version:
Check admin panel or view core/version.php file
Verify Fix Applied:
Confirm version is 2025.7 or later and test file upload functionality with malicious payloads
📡 Detection & Monitoring
Log Indicators:
- Multiple XML file uploads from single user
- Large file uploads with unusual content patterns
Network Indicators:
- POST requests to upload endpoints with XML content
- Subsequent requests to access uploaded files
SIEM Query:
source="web_server" AND (uri_path="/upload" OR method="POST") AND file_extension="xml"