CVE-2026-25514

Source
https://cve.org/CVERecord?id=CVE-2026-25514
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25514.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25514
Aliases
Published
2026-02-04T19:59:54.847Z
Modified
2026-03-01T02:57:24.574492Z
Severity
  • 8.7 (High) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N CVSS Calculator
Summary
FacturaScripts has SQL Injection vulnerability in Autocomplete Actions
Details

FacturaScripts is open-source enterprise resource planning and accounting software. Prior to version 2025.81, FacturaScripts contains a critical SQL injection vulnerability in the autocomplete functionality that allows authenticated attackers to extract sensitive data from the database including user credentials, configuration settings, and all stored business data. The vulnerability exists in the CodeModel::all() method where user-supplied parameters are directly concatenated into SQL queries without sanitization or parameterized binding. This issue has been patched in version 2025.81.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-20",
        "CWE-89",
        "CWE-943"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25514.json"
}
References

Affected packages

Git / github.com/neorazorx/facturascripts

Affected ranges

Type
GIT
Repo
https://github.com/neorazorx/facturascripts
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

2018.*
2018.03
2018.04
2018.05
2018.11
c2024.*
c2024.92
v2018.*
v2018.12
v2018.13
v2018.14
v2018.15
v2018.16
v2020.*
v2020.01
v2020.2
v2020.3
v2020.4
v2020.51
v2020.61
v2020.71
v2020.80
Other
v2021
v2024
v2025
v2021.*
v2021.1
v2021.2
v2021.4
v2021.51
v2021.71
v2021.81
v2022.*
v2022.06
v2022.08
v2022.2
v2022.4
v2022.51
v2023.*
v2023.03
v2023.08
v2023.16
v2023.21
v2024.*
v2024.1
v2024.2
v2024.3
v2024.5
v2024.7
v2024.8
v2024.9
v2024.91
v2025.*
v2025.11
v2025.2
v2025.3
v2025.4
v2025.41
v2025.43
v2025.7
v2025.71
v2025.8

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25514.json"