{"api_version":"1","generated_at":"2026-04-09T09:35:25+00:00","cve":"CVE-2026-33628","urls":{"html":"https://cve.report/CVE-2026-33628","api":"https://cve.report/api/cve/CVE-2026-33628.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-33628","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-33628"},"summary":{"title":"Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice Line Items","description":"Invoice Ninja is a source-available invoice, quote, project and time-tracking app built with Laravel. Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal. The line item description field was not passed through `purify::clean()` before rendering. This is fixed in v5.13.4 by the vendor by adding `purify::clean()` to sanitize line item descriptions.","state":"PUBLISHED","assigner":"GitHub_M","published_at":"2026-03-26 21:17:07","updated_at":"2026-03-30 17:24:09"},"problem_types":["CWE-79","CWE-116","CWE-184","CWE-79 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CWE-116 CWE-116: Improper Encoding or Escaping of Output","CWE-184 CWE-184: Incomplete List of Disallowed Inputs"],"metrics":[{"version":"3.1","source":"security-advisories@github.com","type":"Secondary","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"DECLARED","score":"5.4","severity":"MEDIUM","vector":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"references":[{"url":"https://github.com/invoiceninja/invoiceninja/security/advisories/GHSA-98wm-cxpw-847p","name":"https://github.com/invoiceninja/invoiceninja/security/advisories/GHSA-98wm-cxpw-847p","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/invoiceninja/invoiceninja/releases/tag/v5.13.4","name":"https://github.com/invoiceninja/invoiceninja/releases/tag/v5.13.4","refsource":"security-advisories@github.com","tags":["Release Notes"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://github.com/invoiceninja/invoiceninja/commit/b81a3fc302573fc4a53d61e8537dd19154ce1091","name":"https://github.com/invoiceninja/invoiceninja/commit/b81a3fc302573fc4a53d61e8537dd19154ce1091","refsource":"security-advisories@github.com","tags":["Patch"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-33628","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33628","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"invoiceninja","product":"invoiceninja","version":"affected < 5.13.4","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2026","cve_id":"33628","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"invoiceninja","cpe5":"invoice_ninja","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2026","cve_id":"33628","cve":"CVE-2026-33628","epss":"0.000390000","percentile":"0.118840000","score_date":"2026-04-05","updated_at":"2026-04-06 00:05:32"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-33628","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2026-03-27T13:34:13.647878Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-27T13:55:36.614Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["exploit"],"url":"https://github.com/invoiceninja/invoiceninja/security/advisories/GHSA-98wm-cxpw-847p"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"invoiceninja","vendor":"invoiceninja","versions":[{"status":"affected","version":"< 5.13.4"}]}],"descriptions":[{"lang":"en","value":"Invoice Ninja is a source-available invoice, quote, project and time-tracking app built with Laravel. Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal. The line item description field was not passed through `purify::clean()` before rendering. This is fixed in v5.13.4 by the vendor by adding `purify::clean()` to sanitize line item descriptions."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.4,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-116","description":"CWE-116: Improper Encoding or Escaping of Output","lang":"en","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-184","description":"CWE-184: Incomplete List of Disallowed Inputs","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-26T20:48:45.739Z","orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M"},"references":[{"name":"https://github.com/invoiceninja/invoiceninja/security/advisories/GHSA-98wm-cxpw-847p","tags":["x_refsource_CONFIRM"],"url":"https://github.com/invoiceninja/invoiceninja/security/advisories/GHSA-98wm-cxpw-847p"},{"name":"https://github.com/invoiceninja/invoiceninja/commit/b81a3fc302573fc4a53d61e8537dd19154ce1091","tags":["x_refsource_MISC"],"url":"https://github.com/invoiceninja/invoiceninja/commit/b81a3fc302573fc4a53d61e8537dd19154ce1091"},{"name":"https://github.com/invoiceninja/invoiceninja/releases/tag/v5.13.4","tags":["x_refsource_MISC"],"url":"https://github.com/invoiceninja/invoiceninja/releases/tag/v5.13.4"}],"source":{"advisory":"GHSA-98wm-cxpw-847p","discovery":"UNKNOWN"},"title":"Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice Line Items"}},"cveMetadata":{"assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","assignerShortName":"GitHub_M","cveId":"CVE-2026-33628","datePublished":"2026-03-26T20:48:45.739Z","dateReserved":"2026-03-23T14:24:11.617Z","dateUpdated":"2026-03-27T13:55:36.614Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-26 21:17:07","lastModifiedDate":"2026-03-30 17:24:09","problem_types":["CWE-79","CWE-116","CWE-184","CWE-79 CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')","CWE-116 CWE-116: Improper Encoding or Escaping of Output","CWE-184 CWE-184: Incomplete List of Disallowed Inputs"],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:invoiceninja:invoice_ninja:*:*:*:*:*:*:*:*","versionEndExcluding":"5.13.4","matchCriteriaId":"FC4B6AFE-F1E5-491A-8E54-A20207B38036"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"33628","Ordinal":"1","Title":"Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice","CVE":"CVE-2026-33628","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"33628","Ordinal":"1","NoteData":"Invoice Ninja is a source-available invoice, quote, project and time-tracking app built with Laravel. Invoice line item descriptions in Invoice Ninja v5.13.0 bypass the XSS denylist filter, allowing stored XSS payloads to execute when invoices are rendered in the PDF preview or client portal. The line item description field was not passed through `purify::clean()` before rendering. This is fixed in v5.13.4 by the vendor by adding `purify::clean()` to sanitize line item descriptions.","Type":"Description","Title":"Invoice Ninja Denylist Bypass may Lead to Stored XSS via Invoice"}]}}}