CVE-2026-23491 PUBLISHED

InvoicePlane has Unauthenticated Path Traversal in Guest Controller

Assigner: GitHub_M
Reserved: 13.01.2026 Published: 18.02.2026 Updated: 18.02.2026

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A path traversal vulnerability exists in the get_file method of the Guest module's Get controller in InvoicePlane up to and including through 1.6.3. The vulnerability allows unauthenticated attackers to read arbitrary files on the server by manipulating the input filename. This leads to the disclosure of sensitive information, including configuration files with database credentials. Version 1.6.4 fixes the issue.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:H/SA:H
CVSS Score: 9.3

Product Status

Vendor InvoicePlane
Product InvoicePlane
Versions
  • Version < 1.6.4 is affected

References

Problem Types

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE