Description

FacturaScripts is open-source enterprise resource planning and accounting software. Prior to version 2025.81, FacturaScripts contains a critical SQL injection vulnerability in the REST API that allows authenticated API users to execute arbitrary SQL queries through the sort parameter. The vulnerability exists in the ModelClass::getOrderBy() method where user-supplied sorting parameters are directly concatenated into the SQL ORDER BY clause without validation or sanitization. This affects all API endpoints that support sorting functionality. This issue has been patched in version 2025.81.

INFO

Published Date :

2026-02-04T19:59:57.190Z

Last Modified :

2026-02-05T14:32:21.989Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25513 vulnerability.

Vendors Products
Facturascripts
  • Facturascripts
Neorazorx
  • Facturascripts
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25513.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact