Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-g6w2-q45f-xrp4 | FacturaScripts is Vulnerable to Reflected XSS |
Mon, 23 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:facturascripts:facturascripts:*:*:*:*:*:*:*:* |
Wed, 04 Feb 2026 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Facturascripts
Facturascripts facturascripts Neorazorx Neorazorx facturascripts |
|
| Vendors & Products |
Facturascripts
Facturascripts facturascripts Neorazorx Neorazorx facturascripts |
Tue, 03 Feb 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Feb 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | FacturaScripts is open-source enterprise resource planning and accounting software. Prior to 2025.8, there a reflected XSS bug in FacturaScripts. The problem is in how error messages get displayed. Twig's | raw filter is used, which skips HTML escaping. When triggering a database error (like passing a string where an integer is expected), the error message includes the input and gets rendered without sanitization. This vulnerability is fixed in 2025.8. | |
| Title | FacturaScripts Affected by Reflected XSS | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-03T15:33:51.348Z
Reserved: 2026-01-13T15:47:41.626Z
Link: CVE-2026-23476
Updated: 2026-02-03T15:33:47.336Z
Status : Analyzed
Published: 2026-02-02T23:16:07.030
Modified: 2026-02-23T15:32:54.620
Link: CVE-2026-23476
No data.
OpenCVE Enrichment
Updated: 2026-04-18T00:45:32Z
Github GHSA