<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>FacturaScripts — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/facturascripts/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/facturascripts/feed.xml" rel="self" type="application/rss+xml"/><item><title>FacturaScripts Remote Code Execution via Zip Slip Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2024-01-facturascripts-rce/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-facturascripts-rce/</guid><description>FacturaScripts is vulnerable to remote code execution due to insufficient validation of file paths within uploaded ZIP archives, allowing a Zip Slip attack and arbitrary file write leading to RCE.</description><content:encoded><![CDATA[<p>FacturaScripts, a web application, is vulnerable to a critical remote code execution (RCE) vulnerability (CVE-2026-27891) due to a Zip Slip flaw in the plugin upload mechanism. Specifically, the <code>Plugins::add()</code> function fails to properly validate file paths within uploaded ZIP archives. This allows an attacker to inject malicious PHP code into arbitrary locations on the server by crafting a ZIP archive with path traversal sequences. The vulnerability affects FacturaScripts versions 2025.71 and earlier. Successful exploitation allows an attacker to gain complete control of the affected system, potentially leading to data theft, system compromise, or denial of service. This poses a significant threat to organizations using FacturaScripts for their business operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious ZIP archive containing a PHP file with a web shell, such as <code>rce.php</code>. The malicious filename includes path traversal sequences like <code>MyPlugin/../../rce.php</code>.</li>
<li>The attacker logs into the FacturaScripts web application with administrative privileges.</li>
<li>The attacker navigates to the plugin management section.</li>
<li>The attacker uploads the crafted malicious ZIP archive through the &ldquo;Add Plugin&rdquo; functionality.</li>
<li>The <code>Plugins::add()</code> function processes the uploaded ZIP file, bypassing the single root folder check with the <code>ValidPluginName</code> prefix, but fails to properly sanitize the file paths.</li>
<li>The ZIP archive is extracted, and the malicious PHP file <code>rce.php</code> is written to an arbitrary location outside the intended plugin directory due to the <code>../../</code> path traversal sequence.</li>
<li>The attacker sends an HTTP request to the injected PHP web shell (e.g., <code>https://target.com/rce.php?cmd=whoami</code>) with commands to execute.</li>
<li>The web server executes the attacker&rsquo;s command, granting the attacker arbitrary code execution on the server.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to achieve Remote Code Execution (RCE) on the FacturaScripts server. The attacker can read all database configurations and files, modify any file on the server, and potentially delete the entire installation. This can lead to complete compromise of the system, data theft, and disruption of business operations. Given the sensitive nature of data often managed by FacturaScripts, such as financial records and customer information, the impact is considered high across confidentiality, integrity, and availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade FacturaScripts to a patched version beyond 2025.71 to remediate CVE-2026-27891.</li>
<li>Implement server-side input validation to sanitize uploaded filenames and prevent path traversal during ZIP extraction.</li>
<li>Monitor web server logs for suspicious HTTP requests to potentially injected PHP shells such as <code>/rce.php</code> using a rule like &ldquo;Detect Access to Web Shell via GET Parameter&rdquo;.</li>
<li>Deploy the Sigma rule &ldquo;Detect FacturaScripts Plugin Upload with Path Traversal&rdquo; to identify malicious ZIP uploads.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>zip-slip</category><category>rce</category><category>factura scripts</category></item></channel></rss>