Client Invoicing by Sprout Invoices – Easy Estimates and Invoices f…

Client Invoicing by Sprout Invoices – Easy Estimates and Invoices f…

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25364 is a Medium-severity (CVSS 5.3) missing authorization issue affecting Client Invoicing by Sprout Invoices – Easy Estimates and Invoices for WordPress (slug: sprout-invoices) in versions up to and including 20.8.8.

Because the weakness can be triggered by unauthenticated users (no login required), attackers can attempt to reach the vulnerable function directly over the internet and perform an unauthorized action without user interaction. This increases exposure for any site running the plugin on a publicly accessible WordPress installation.

Reference: CVE record and Wordfence advisory.

Security Weakness

The vulnerability is caused by a missing capability check (i.e., missing authorization) on a plugin function. In practical terms, a site may allow a request to proceed without confirming the requester has the required permissions.

This is a governance and control problem as much as a technical one: administrative or business-critical actions should only be available to authenticated users with appropriate roles. When those checks are absent, the plugin can unintentionally expose “internal-only” actions to the public internet.

Remediation: Update Client Invoicing by Sprout Invoices to version 20.8.9 or any newer patched version.

Technical or Business Impacts

While the published scoring indicates no direct confidentiality impact and a low integrity impact (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), missing authorization issues in invoicing-related software can still create meaningful business risk.

Potential impacts include:

• Invoice process integrity risk: Unauthorized actions could disrupt or manipulate parts of the invoicing workflow supported by the plugin, increasing the chance of billing errors, misapplied changes, or customer disputes.

• Financial and brand risk: Even limited unauthorized changes tied to estimates/invoices can undermine trust with customers and create time-consuming reconciliation work for finance and operations teams.

• Compliance and audit pressure: Weak access controls around financial workflows can raise questions during internal audits or compliance reviews, especially if the organization must demonstrate that only approved roles can trigger invoice-related actions.

Recommended next steps for leadership teams: confirm the plugin version, prioritize the update to 20.8.9+, and ensure WordPress/core/plugins are kept current as part of routine risk management.

Similar Attacks

Authorization gaps in WordPress plugins are a recurring theme. For example, the WP GDPR Compliance plugin previously had a widely reported privilege escalation issue that allowed unauthorized account changes under certain conditions (Wordfence coverage: https://www.wordfence.com/blog/2018/11/wp-gdpr-compliance-plugin-vulnerability/).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers