Plattform
php
Komponente
invoiceninja
Behoben in
5.11.24
CVE-2025-0474 describes an authenticated Server-Side Request Forgery (SSRF) vulnerability affecting Invoice Ninja. This vulnerability allows attackers to trigger arbitrary file read operations and network resource requests as the application user, potentially leading to sensitive data exposure or unauthorized access. The vulnerability impacts Invoice Ninja versions 5.8.56 through 5.11.23, and a patch is available in version 5.11.24.
The SSRF vulnerability in Invoice Ninja allows an authenticated attacker to craft requests that the application will execute on behalf of the user. This can be exploited to read local files on the server, potentially exposing configuration files, database credentials, or other sensitive data. Furthermore, the attacker can leverage the SSRF to interact with internal network resources that are not directly accessible from the outside, enabling lateral movement or access to other systems within the network. The potential impact extends to data breaches, system compromise, and disruption of business operations.
CVE-2025-0474 was publicly disclosed on 2025-01-14. There are currently no known public proof-of-concept exploits available. The EPSS score is pending evaluation. Monitor security advisories and threat intelligence feeds for any indications of active exploitation.
Organizations using Invoice Ninja for invoicing and accounting, particularly those with sensitive financial data, are at risk. Environments with limited network segmentation or overly permissive outbound network rules are especially vulnerable. Shared hosting environments where multiple users share the same Invoice Ninja instance should be carefully assessed.
• php / server:
find /var/www/html/invoice-ninja -name "*.php" -print0 | xargs -0 grep -i "request_uri"• generic web:
curl -I http://your-invoice-ninja-domain/internal-resource• generic web: Check access logs for unusual outbound requests originating from the Invoice Ninja application server.
disclosure
Exploit-Status
EPSS
0.17% (38% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2025-0474 is to upgrade Invoice Ninja to version 5.11.24 or later, which contains the fix. If immediate upgrading is not possible, consider implementing temporary workarounds such as restricting outbound network access from the Invoice Ninja application server using a Web Application Firewall (WAF) or proxy. Configure the WAF to block requests to potentially sensitive internal resources. Carefully review and restrict any user-controlled input that is used to construct URLs within the application. After upgrading, confirm the fix by attempting to trigger an SSRF request and verifying that it is blocked.
Aktualisieren Sie Invoice Ninja auf eine Version nach 5.11.23. Dies behebt die SSRF-Vulnerabilität, die das Lesen beliebiger Dateien und Anfordern von Netzwerkressourcen als der Anwendungbenutzer ermöglicht. Weitere Details zur Aktualisierung finden Sie in den Versionshinweisen.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2025-0474 is a Server-Side Request Forgery vulnerability in Invoice Ninja versions 5.8.56–5.11.23, allowing attackers to trigger arbitrary file reads and network requests.
You are affected if you are running Invoice Ninja versions 5.8.56 through 5.11.23. Upgrade to 5.11.24 or later to mitigate the risk.
Upgrade Invoice Ninja to version 5.11.24 or later. As a temporary workaround, restrict outbound network access using a WAF or proxy.
There are currently no known public exploits or confirmed active exploitation campaigns for CVE-2025-0474.
Refer to the Invoice Ninja security advisory on their official website or blog for detailed information and updates.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.