CVE-2026-0649

4.7 MEDIUM

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in InvoiceNinja's migration import functionality. Attackers can manipulate the company_logo parameter to make the server send unauthorized requests to internal or external systems. All InvoiceNinja instances up to version 5.12.38 are affected.

💻 Affected Systems

Products:
  • InvoiceNinja
Versions: up to 5.12.38
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires migration import functionality to be accessible.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, or pivot to other systems within the network.

🟠

Likely Case

Information disclosure from internal services, potential data exfiltration, or abuse of server resources.

🟢

If Mitigated

Limited impact if proper network segmentation and egress filtering are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires access to migration import functionality. Public disclosure suggests active exploitation is possible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: No

Instructions:

Upgrade to version 5.12.39 or later when available. Monitor InvoiceNinja releases for security updates.

🔧 Temporary Workarounds

Disable Migration Import

all

Temporarily disable or restrict access to the migration import functionality.

# Modify application configuration or access controls

Input Validation

all

Implement strict validation on company_logo parameter to allow only trusted URLs.

# Modify /app/Jobs/Util/Import.php to validate URLs

🧯 If You Can't Patch

  • Implement network egress filtering to restrict outbound requests from the InvoiceNinja server.
  • Use web application firewall (WAF) rules to block SSRF patterns in requests.

🔍 How to Verify

Check if Vulnerable:

Check if InvoiceNinja version is 5.12.38 or earlier and migration import is accessible.

Check Version:

Check InvoiceNinja admin panel or application configuration files for version number.

Verify Fix Applied:

Verify version is 5.12.39 or later, or test SSRF attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from InvoiceNinja server
  • Requests to internal IP addresses or unusual domains

Network Indicators:

  • HTTP requests from InvoiceNinja server to unexpected destinations
  • Port scanning patterns from the server

SIEM Query:

source="invoiceninja" AND (url="*company_logo*" OR method="POST" AND path="*/import*")

🔗 References

📤 Share & Export