Cyber Posture

CVE-2024-56975

Critical

Published: 28 March 2025

Published
28 March 2025
Modified
14 April 2025
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0228 84.8th percentile
Risk Priority 21 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2024-56975 is a remote code execution vulnerability in InvoicePlane versions 1.6.11 and prior, with all versions tested as of December 2024 confirmed affected. The flaw resides in the upload_file method of the Upload controller, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). It carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), highlighting its critical severity due to network accessibility, low attack complexity, and lack of prerequisites.

Unauthenticated attackers with network access to an affected InvoicePlane instance can exploit the vulnerability remotely without user interaction. Successful exploitation enables arbitrary code execution on the server, potentially granting full control over the system and leading to high-impact compromise of confidentiality, integrity, and availability.

Mitigation involves applying fixes from the referenced GitHub pull requests: https://github.com/InvoicePlane/InvoicePlane/pull/1127 and https://github.com/InvoicePlane/InvoicePlane/pull/1166, which address the issue in the Upload controller.

Details

CWE(s)
CWE-434

Affected Products

invoiceplane
invoiceplane
≤ 1.6.2

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The CVE describes an unauthenticated remote code execution flaw in a public-facing web application (InvoicePlane) via unrestricted file upload (CWE-434), directly enabling exploitation of public-facing applications for arbitrary code execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References