๐Ÿ” CVE Alert

CVE-2026-25548

CRITICAL 9.1

InvoicePlane Vulnerable to Remote Code Execution via Local File Inclusion and Log Poisoning

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue.

CWE CWE-94 CWE-98 CWE-117
Vendor invoiceplane
Product invoiceplane
Published Feb 18, 2026
Last Updated Feb 19, 2026
Stay Ahead of the Next One

Get instant alerts for invoiceplane invoiceplane

Be the first to know when new critical vulnerabilities affecting invoiceplane invoiceplane are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

InvoicePlane / InvoicePlane
<= 1.7.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/InvoicePlane/InvoicePlane/security/advisories/GHSA-g6rw-m9mf-33ch github.com: https://github.com/InvoicePlane/InvoicePlane/commit/93622f2df88a860d89bfee56012cabb2942061d6