Exploit for CVE-2026-25548

InvoicePlane is a self-hosted open source application for managing invoices, clients, and payments. A critical Remote Code Execution (RCE) vulnerability exists in InvoicePlane 1.7.0 through a chained Local File Inclusion (LFI) and Log Poisoning attack. An authenticated administrator can execute arbitrary system commands on the server by manipulating the `public_invoice_template` setting to include poisoned log files containing PHP code. Version 1.7.1 patches the issue.

Published: 2026-02-18

CVSS: 9.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Download Exploit for CVE-2026-25548 here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

Check our portfolio:

https://veletacapital.com/exploit-701-cve-2026-24731/

https://veletacapital.com/exploit-177-cve-2026-2133/

https://veletacapital.com/exploit-6-cve-2026-20407/

https://veletacapital.com/exploit-793-cve-2026-24111/

https://veletacapital.com/exploit-546-cve-2026-25986/