CVE-2026-7093
Received Received - Intake
Improper Authorization in Invoice System Laravel 1.0 Endpoint

Publication date: 2026-04-27

Last updated on: 2026-04-29

Assigner: VulDB

Description
A vulnerability was found in code-projects Invoice System in Laravel 1.0. Affected by this vulnerability is an unknown functionality of the file /invoice/ of the component Invoice Endpoint. Performing a manipulation of the argument ID results in improper authorization. The attack is possible to be carried out remotely. The exploit has been made public and could be used.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
code-projects invoice_system 1.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-266 A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor.
CWE-285 The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-7093 is a vulnerability in the Invoice System version 1.0 built with Laravel. It is an Insecure Direct Object Reference (IDOR) combined with Cross-Tenant Data Exposure. The issue occurs in the /invoice/{id} endpoint, where invoice records can be accessed or modified by specifying the invoice ID directly without verifying if the invoice belongs to the requesting tenant (company). This lack of tenant verification allows attackers to access or manipulate invoices belonging to other companies by simply changing the invoice ID in the request.

Although the system scopes invoices by tenant in the index view, direct access to a specific invoice ID bypasses this isolation because the controller does not check the company_id associated with the invoice. This enables unauthorized access and modification of invoices across tenants.


How can this vulnerability impact me? :

This vulnerability can lead to several serious impacts including exposure of sensitive billing and financial data, unauthorized modification of invoices, and business risks such as disclosure of customer lists and transaction histories across different tenants (companies).

  • Confidentiality breach by exposing sensitive invoice and financial information.
  • Integrity breach by allowing unauthorized changes to invoice data.
  • Business risks including loss of customer trust and potential competitive disadvantages due to data leakage.

How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting unauthorized access to invoice records belonging to other tenants via the /invoice/{id} endpoint. A simple test is to send GET requests to different invoice IDs and observe if invoices from other companies are accessible without proper authorization.

  • Use curl or similar HTTP clients to send requests like: curl -X GET https://yourdomain.com/invoice/5
  • Check if the response returns invoice data that should not belong to the authenticated tenant.
  • Monitor network traffic for unauthorized access patterns to /invoice/{id} endpoints.

What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include enforcing tenant verification on all invoice queries and applying authorization policies to prevent unauthorized access or modification.

  • Modify the code to scope invoice queries by tenant, for example: Invoice::where('company_id', auth()->user()->company_id)->findOrFail($id)
  • Apply Laravel Policies to enforce authorization on all read and write operations on the Invoice model.
  • Use Laravel’s route model binding with scoped bindings to automatically enforce tenant isolation.

How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability CVE-2026-7093 leads to unauthorized access and modification of invoice data across tenants, resulting in exposure of sensitive billing and financial information. This breach of confidentiality and integrity can cause non-compliance with data protection regulations such as GDPR and HIPAA, which mandate strict controls on access to personal and financial data to protect privacy and ensure data security.

Specifically, the cross-tenant data exposure and lack of proper authorization controls violate principles of data minimization and access control required by these standards, potentially leading to regulatory penalties and loss of trust.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart