GHSA-r736-2678-fcrx

Suggest an improvement
Source
https://github.com/advisories/GHSA-r736-2678-fcrx
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-r736-2678-fcrx/GHSA-r736-2678-fcrx.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-r736-2678-fcrx
Aliases
  • CVE-2026-42877
Published
2026-05-07T19:37:08Z
Modified
2026-05-07T19:48:56.794842Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
FacturaScripts vulnerable to stored XSS via product reference in sales/purchases
Details

Summary

A stored Cross-Site Scripting (XSS) vulnerability exists in the product search modal of sales and purchases documents. An authenticated user with access to the warehouse module can create a product with a malicious reference that executes arbitrary JavaScript in the browser of any other user who opens the product search modal inside an invoice, order, or delivery note.

Affected files

  • Core/Lib/AjaxForms/SalesModalHTML.php
  • Core/Lib/AjaxForms/PurchasesModalHTML.php

Vulnerability details

The referencia field of a product variant is injected directly into an HTML onclick attribute string without JavaScript context escaping:

// SalesModalHTML.php ~line 102
$tbody .= '<tr onclick="return salesFormAction(\'add-product\', \''
    . $row['referencia']   // no htmlspecialchars() applied
    . '\');">';

When a product is saved, noHtml() encodes '&#39;. This appears safe in static HTML context. However, the modal HTML is later returned as a JSON response and inserted into the DOM via innerHTML:

// SalesDocument.html.twig line 118
document.getElementById("findProductList").innerHTML = data.products;

The browser HTML parser decodes &#39;' during the innerHTML assignment, breaking out of the JavaScript string literal in the onclick attribute and executing the injected code.

Attack payload stored in database: x&#39;+alert(1)+&#39;

Resulting onclick after innerHTML decode:

return salesFormAction('add-product', 'x'+alert(1)+'')
//                                        ^^^^^^^^^^ executes before the function call

Steps to reproduce

Step 1 — Inject the payload

  1. Log in as a user with write access to Warehouse → Products
  2. Navigate to /EditProducto and create a new product with the following values:

| Field | Value | |---|---| | Reference | x'+alert(1)+' | | Description | test |

  1. Save the product

Step 2 — Trigger the XSS

  1. Make sure at least one customer exists in the system (Sales → Customers)
  2. Navigate to /EditFacturaCliente?codcliente=<customer_code>
  3. In the invoice form, click the product search button next to the "Referencia" field
  4. Click on the 'malicious' product alert(1)

<img width="1162" height="536" alt="image" src="https://github.com/user-attachments/assets/aaa2879e-c1fb-4af9-8501-bac03ca24ffe" />

Impact

Although session cookies (fsLogkey, fsNick) have the HttpOnly flag set and cannot be read directly via document.cookie, the injected script runs in the victim's authenticated browser context, meaning the attacker can make arbitrary authenticated requests on their behalf, create new admin users via AJAX POST to /EditUser, exfiltrate any business data visible in the DOM, or redirect the user to an external site. The most critical scenario is privilege escalation: a low-privilege employee with only warehouse access can execute JavaScript in an administrator's session without knowing their password.

Recommended fix

Apply htmlspecialchars() with ENT_QUOTES before inserting referencia into the onclick attribute in both affected files.

Core/Lib/AjaxForms/SalesModalHTML.php

// Before (vulnerable):
$tbody .= '<tr onclick="return salesFormAction(\'add-product\', \''
    . $row['referencia']
    . '\');">';

// After (safe):
$tbody .= '<tr onclick="return salesFormAction(\'add-product\', \''
    . htmlspecialchars($row['referencia'], ENT_QUOTES, 'UTF-8')
    . '\');">';

Core/Lib/AjaxForms/PurchasesModalHTML.php

Apply the same change to the equivalent line.

Why ENT_QUOTES is required: ENT_QUOTES encodes both " and ' characters. This ensures that ' is stored as &#39; and — critically — remains &#39; after innerHTML assignment, because htmlspecialchars produces a form that the HTML parser does not decode back into a raw quote inside a JS string context.

Alternative mitigation: replace innerHTML with innerText or a DOM-based rendering approach that never parses injected strings as HTML. This would eliminate the entire class of HTML-injection-via-innerHTML vulnerabilities in the sales and purchases forms.

Credits

Omar Ramirez

Database specific
{
    "github_reviewed": true,
    "github_reviewed_at": "2026-05-07T19:37:08Z",
    "cwe_ids": [
        "CWE-79"
    ],
    "severity": "MODERATE",
    "nvd_published_at": null
}
References

Affected packages

Packagist / facturascripts/facturascripts

Package

Name
facturascripts/facturascripts
Purl
pkg:composer/facturascripts/facturascripts

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
2025.92

Affected versions

2018.*
2018.03
2018.04
2018.05
2018.11
v2018.*
v2018.12
v2018.13
v2018.14
v2018.15
v2018.16
v2020.*
v2020.01
v2020.2
v2020.3
v2020.4
v2020.51
v2020.61
v2020.71
v2020.80
Other
v2021
v2024
v2025
v2021.*
v2021.1
v2021.2
v2021.4
v2021.51
v2021.71
v2021.81
v2022.*
v2022.2
v2022.4
v2022.06
v2022.08
v2022.51
v2023.*
v2023.03
v2023.08
v2023.16
v2023.21
v2024.*
v2024.1
v2024.2
v2024.3
v2024.5
v2024.7
v2024.8
v2024.9
v2024.91
v2024.93
v2024.94
v2024.95
v2024.96
v2025.*
v2025.2
v2025.3
v2025.4
v2025.7
v2025.8
v2025.11
v2025.41
v2025.43
v2025.71
v2025.81

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2026/05/GHSA-r736-2678-fcrx/GHSA-r736-2678-fcrx.json"