Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. facturascripts/facturascripts
  4. ›
  5. CVE-2026-23476

CVE-2026-23476: FacturaScripts is Vulnerable to Reflected XSS

February 2, 2026 (updated February 3, 2026)

A reflected XSS bug has been found in FacturaScripts. The problem is in how error messages get displayed - it’s using Twig’s | raw filter which skips HTML escaping. When a database error is triggered (like passing a string where an integer is expected), the error message includes all input and gets rendered without sanitization.

Attackers can use this to phish credentials from other users since HttpOnly is set on cookies (so stealing cookies directly won’t work, but attackers can inject a fake login form).

CVSS 6.1 (Medium-High)


References

  • github.com/NeoRazorX/facturascripts
  • github.com/NeoRazorX/facturascripts/commit/2afd98cecd26c5f8357e0e321d86063ad1012fc3
  • github.com/NeoRazorX/facturascripts/releases/tag/v2025.8
  • github.com/NeoRazorX/facturascripts/security/advisories/GHSA-g6w2-q45f-xrp4
  • github.com/advisories/GHSA-g6w2-q45f-xrp4
  • nvd.nist.gov/vuln/detail/CVE-2026-23476

Code Behaviors & Features

Detect and mitigate CVE-2026-23476 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 2025.81

Fixed versions

  • 2025.81

Solution

Upgrade to version 2025.81 or above.

Impact 5.4 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

Source file

packagist/facturascripts/facturascripts/CVE-2026-23476.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 16 Feb 2026 12:20:26 +0000.