Threat Advisory

FacturaScripts Vulnerabilities Cause Autocomplete Based SQL Manipulation Attacks

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: High


EXECUTIVE SUMMARY:

Two high‑severity SQL injection vulnerabilities were identified in FacturaScripts, an open‑source web application framework. The first flaw allows SQL injection through the autocomplete actions feature, where unsanitized user input is included directly in database queries, enabling authenticated attackers to extract sensitive information such as user credentials and business data. The second issue exists in the REST APIs sorting functionality, where the sort of parameter is improperly concatenated into the SQL ORDER BY clause without validation, allowing authenticated API users to craft arbitrary SQL queries that could expose confidential data or compromise systems. Both vulnerabilities highlight insufficient input validation and could be exploited remotely by authenticated users to manipulate backend queries and access or exfiltrate sensitive information if applications are deployed with vulnerable versions.

  • CVE-2026-25513: It is a SQL Injection vulnerability in the FacturaScripts REST API caused by improper handling of user‑supplied sorting parameters in SQL ORDER BY clauses. An authenticated attacker can exploit this flaw to execute arbitrary SQL queries, leading to unauthorized data access or manipulation. The vulnerability has a CVSS score of 8.3.
  • CVE‑2026‑25514: It is a SQL Injection vulnerability in the FacturaScripts autocomplete functionality due to improper sanitization of user‑supplied input, allowing malicious SQL statements to be injected into backend database queries. This flaw can be abused to retrieve, modify, or delete database information without proper authorization. The vulnerability has a CVSS score of 8.7.

 

RECOMMENDATION:

  • We strongly recommend you update FacturaScripts to version 2025.81 or later.

 

REFERENCES:

The following reports contain further technical details:

https://github.com/advisories/GHSA-pqqg-5f4f-8952

https://github.com/advisories/GHSA-cjfx-qhwm-hf99

crossmenu