POC详情: d1a5f95e6d33f545dbc57f5be19323fab8f1225f

来源
关联漏洞
标题: SolidInvoice 安全漏洞 (CVE-2025-55580)
描述:SolidInvoice是SolidInvoice开源的一个发票解决方案应用程序。 SolidInvoice 2.3.7版本和2.3.8版本存在安全漏洞,该漏洞源于客户端功能容易受到跨站脚本攻击。
描述
CVE-2025-55580
介绍
# CVE-2025-55580 - SolidInvoice Stored Cross-Site Scripting (XSS) in Clients

## Summary
SolidInvoice is vulnerable to a Stored Cross-Site Scripting (XSS) issue in the Client Module. An authenticated attacker can inject arbitrary JavaScript into the application, which will then execute in users' browsers.
## Affected Versions
* **Vulnerable:** 2.3.7
* **Fixed:** 2.3.8

## Impact
Exploitation allows a malicious user to store arbitrary JavaScript in the application, which will execute in the context of other authenticated users who view the *Clients* page. If the application is deployed in a multi-user environment - for example, with multiple admins, this could lead to:
* Session hijacking
* Credential or token theft
* Phishing or social engineering attacks
* Arbitrary actions performed on behalf of another user

## Proof-of-Concept
1. Navigate to *Clients > Add Client*.
2. Enter a payload in the *Name* field with the following format:
   ```
   <script>prompt(document.cookie)</script>
   ```
3. Fill in all required fields and save the client.
4. Visit *Clients > List Clients* to trigger the script.

## Remediation
Update SolidInvoice to version **2.3.8 or later**.

## References
**Product:** https://solidinvoice.co/
文件快照

[4.0K] /data/pocs/d1a5f95e6d33f545dbc57f5be19323fab8f1225f └── [1.2K] README.md 0 directories, 1 file
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。