{"api_version":"1","generated_at":"2026-05-13T12:21:12+00:00","cve":"CVE-2026-0649","urls":{"html":"https://cve.report/CVE-2026-0649","api":"https://cve.report/api/cve/CVE-2026-0649.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-0649","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-0649"},"summary":{"title":"invoiceninja Migration Import Import.php copy server-side request forgery","description":"A security vulnerability has been detected in invoiceninja up to 5.12.38. The affected element is the function copy of the file /app/Jobs/Util/Import.php of the component Migration Import. The manipulation of the argument company_logo leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","state":"PUBLISHED","assigner":"VulDB","published_at":"2026-01-07 12:17:07","updated_at":"2026-04-29 01:00:01"},"problem_types":["CWE-918","CWE-918 Server-Side Request Forgery"],"metrics":[{"version":"4.0","source":"cna@vuldb.com","type":"Secondary","score":"2","severity":"LOW","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"DECLARED","score":"5.1","severity":"MEDIUM","vector":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","data":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"version":"3.1","source":"cna@vuldb.com","type":"Primary","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"version":"3.0","source":"CNA","type":"DECLARED","score":"4.7","severity":"MEDIUM","vector":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","data":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"version":"2.0","source":"cna@vuldb.com","type":"Secondary","score":"5.8","severity":"","vector":"AV:N/AC:L/Au:M/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}},{"version":"2.0","source":"CNA","type":"DECLARED","score":"5.8","severity":"","vector":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","data":{"baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"references":[{"url":"https://vuldb.com/?submit.721323","name":"https://vuldb.com/?submit.721323","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?ctiid.339720","name":"https://vuldb.com/?ctiid.339720","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://vuldb.com/?id.339720","name":"https://vuldb.com/?id.339720","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://note-hxlab.wetolink.com/share/fWqEpn5fX4rH","name":"https://note-hxlab.wetolink.com/share/fWqEpn5fX4rH","refsource":"cna@vuldb.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-0649","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0649","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.0","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.1","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.2","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.3","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.4","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.5","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.6","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.7","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.8","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.9","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.10","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.11","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.12","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.13","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.14","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.15","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.16","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.17","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.18","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.19","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.20","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.21","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.22","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.23","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.24","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.25","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.26","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.27","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.28","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.29","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.30","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.31","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.32","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.33","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.34","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.35","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.36","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.37","platforms":[]},{"source":"CNA","vendor":"n/a","product":"invoiceninja","version":"affected 5.12.38","platforms":[]}],"timeline":[{"source":"CNA","time":"2026-01-06T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"source":"CNA","time":"2026-01-06T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"source":"CNA","time":"2026-01-08T10:11:19.000Z","lang":"en","value":"VulDB entry last update"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"gets (VulDB User)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-0649","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-01-07T14:27:52.863067Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-01-07T14:28:45.081Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"modules":["Migration Import"],"product":"invoiceninja","vendor":"n/a","versions":[{"status":"affected","version":"5.12.0"},{"status":"affected","version":"5.12.1"},{"status":"affected","version":"5.12.2"},{"status":"affected","version":"5.12.3"},{"status":"affected","version":"5.12.4"},{"status":"affected","version":"5.12.5"},{"status":"affected","version":"5.12.6"},{"status":"affected","version":"5.12.7"},{"status":"affected","version":"5.12.8"},{"status":"affected","version":"5.12.9"},{"status":"affected","version":"5.12.10"},{"status":"affected","version":"5.12.11"},{"status":"affected","version":"5.12.12"},{"status":"affected","version":"5.12.13"},{"status":"affected","version":"5.12.14"},{"status":"affected","version":"5.12.15"},{"status":"affected","version":"5.12.16"},{"status":"affected","version":"5.12.17"},{"status":"affected","version":"5.12.18"},{"status":"affected","version":"5.12.19"},{"status":"affected","version":"5.12.20"},{"status":"affected","version":"5.12.21"},{"status":"affected","version":"5.12.22"},{"status":"affected","version":"5.12.23"},{"status":"affected","version":"5.12.24"},{"status":"affected","version":"5.12.25"},{"status":"affected","version":"5.12.26"},{"status":"affected","version":"5.12.27"},{"status":"affected","version":"5.12.28"},{"status":"affected","version":"5.12.29"},{"status":"affected","version":"5.12.30"},{"status":"affected","version":"5.12.31"},{"status":"affected","version":"5.12.32"},{"status":"affected","version":"5.12.33"},{"status":"affected","version":"5.12.34"},{"status":"affected","version":"5.12.35"},{"status":"affected","version":"5.12.36"},{"status":"affected","version":"5.12.37"},{"status":"affected","version":"5.12.38"}]}],"credits":[{"lang":"en","type":"reporter","value":"gets (VulDB User)"}],"descriptions":[{"lang":"en","value":"A security vulnerability has been detected in invoiceninja up to 5.12.38. The affected element is the function copy of the file /app/Jobs/Util/Import.php of the component Migration Import. The manipulation of the argument company_logo leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way."}],"metrics":[{"cvssV4_0":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","version":"4.0"}},{"cvssV3_1":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.1"}},{"cvssV3_0":{"baseScore":4.7,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","version":"3.0"}},{"cvssV2_0":{"baseScore":5.8,"vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P/E:POC/RL:ND/RC:UR","version":"2.0"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-918","description":"Server-Side Request Forgery","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-02-23T08:22:03.166Z","orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB"},"references":[{"name":"VDB-339720 | invoiceninja Migration Import Import.php copy server-side request forgery","tags":["vdb-entry","technical-description"],"url":"https://vuldb.com/?id.339720"},{"name":"VDB-339720 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"],"url":"https://vuldb.com/?ctiid.339720"},{"name":"Submit #721323 | invoiceninja <= 5.12.38. ssrf","tags":["third-party-advisory"],"url":"https://vuldb.com/?submit.721323"},{"tags":["exploit"],"url":"https://note-hxlab.wetolink.com/share/fWqEpn5fX4rH"}],"timeline":[{"lang":"en","time":"2026-01-06T00:00:00.000Z","value":"Advisory disclosed"},{"lang":"en","time":"2026-01-06T01:00:00.000Z","value":"VulDB entry created"},{"lang":"en","time":"2026-01-08T10:11:19.000Z","value":"VulDB entry last update"}],"title":"invoiceninja Migration Import Import.php copy server-side request forgery"}},"cveMetadata":{"assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","assignerShortName":"VulDB","cveId":"CVE-2026-0649","datePublished":"2026-01-07T00:32:07.531Z","dateReserved":"2026-01-06T16:20:31.689Z","dateUpdated":"2026-02-23T08:22:03.166Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-01-07 12:17:07","lastModifiedDate":"2026-04-29 01:00:01","problem_types":["CWE-918","CWE-918 Server-Side Request Forgery"],"metrics":{"cvssMetricV40":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"LOW","vulnAvailabilityImpact":"LOW","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"PROOF_OF_CONCEPT","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"cna@vuldb.com","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","baseScore":4.7,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":1.2,"impactScore":3.4}],"cvssMetricV2":[{"source":"cna@vuldb.com","type":"Secondary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:M/C:P/I:P/A:P","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"MULTIPLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":6.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"649","Ordinal":"1","Title":"invoiceninja Migration Import Import.php copy server-side reques","CVE":"CVE-2026-0649","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"649","Ordinal":"1","NoteData":"A security vulnerability has been detected in invoiceninja up to 5.12.38. The affected element is the function copy of the file /app/Jobs/Util/Import.php of the component Migration Import. The manipulation of the argument company_logo leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.","Type":"Description","Title":"invoiceninja Migration Import Import.php copy server-side reques"}]}}}