CVE-2026-24745

Source
https://cve.org/CVERecord?id=CVE-2026-24745
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24745.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-24745
Aliases
  • GHSA-r9rq-f946-6x54
Published
2026-02-18T22:47:19.717Z
Modified
2026-03-02T08:04:30.465524Z
Severity
  • 5.7 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:L CVSS Calculator
Summary
InvoicePlane has a Stored Cross-Site Scripting (XSS) issue
Details

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A Stored Cross-Site Scripting (XSS) vulnerability occurs in the upload Login Logo functions of InvoicePlane version 1.7.0. In the Upload Login Logo, the application allows uploading svg files. Although administrator privileges are required to exploit it, this is still considered a critical vulnerability as it can cause actions such as unauthorized modification of application data, creation of persistent backdoors through stored malicious scripts, and full compromise of the application's integrity. Version 1.7.1 patches the issue.

Database specific
{
    "cwe_ids": [
        "CWE-79"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/24xxx/CVE-2026-24745.json"
}
References

Affected packages

Git / github.com/invoiceplane/invoiceplane

Affected ranges

Type
GIT
Repo
https://github.com/invoiceplane/invoiceplane
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

0.*
0.9beta
v1.*
v1.0.0
v1.0.1
v1.0.2
v1.1.0
v1.1.1
v1.1.2
v1.2.0
v1.2.1
v1.3.0
v1.3.1
v1.3.2
v1.3.3
v1.4.0
v1.4.1
v1.4.10
v1.4.2
v1.4.3
v1.4.4
v1.4.5
v1.4.6
v1.4.7
v1.4.8
v1.4.9
v1.5.0
v1.5.0-beta.1
v1.5.0-beta.2
v1.5.0-beta.3
v1.5.0-beta.4
v1.5.1
v1.5.10
v1.5.11
v1.5.2
v1.5.3
v1.5.4
v1.5.5
v1.5.6
v1.5.7
v1.5.8
v1.5.9
v1.6-beta
v1.6-beta-1
v1.6-beta-2
v1.6-beta-3
v1.6.0
v1.6.1
v1.6.1-alpha-1
v1.6.1-beta-1
v1.6.1-beta-2
v1.6.1-beta-3
v1.6.2
v1.6.2-beta-1
v1.6.2-beta-2
v1.6.2-beta-3
v1.6.3
v1.6.3-rc0
v1.6.3-rc1
v1.6.3-rc2
v1.6.4-beta-1
v1.6.5

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-24745.json"