CVE-2026-25548 PUBLISHED

InvoicePlane Vulnerable to Remote Code Execution via Local File Inclusion and Log Poisoning

Assigner: GitHub_M
Reserved: 02.02.2026 Published: 18.02.2026 Updated: 18.02.2026

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the public_invoice_template setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor InvoicePlane
Product InvoicePlane
Versions
  • Version <= 1.7.0 is affected

References

Problem Types

  • CWE-94: Improper Control of Generation of Code ('Code Injection') CWE
  • CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') CWE
  • CWE-117: Improper Output Neutralization for Logs CWE