Cyber Posture

CVE-2025-56424

HighPublic PoC

Published: 08 January 2026

Published
08 January 2026
Modified
12 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0038 59.2th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-56424 is a high-severity Uncontrolled Resource Consumption (CWE-400) vulnerability in Insiders-Technologies E-Invoice Pro. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.8% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-400

Limiting concurrent sessions directly prevents uncontrolled resource consumption by capping the number of active sessions per user or account.

addresses: CWE-400

Analysis identifies uncontrolled resource consumption indicative of denial-of-service or abuse attempts.

addresses: CWE-400

Contingency plan testing includes resource exhaustion scenarios to verify recovery, making it harder for attackers to sustain exploits that cause uncontrolled consumption.

addresses: CWE-400

Updated contingency plans include current procedures to detect, contain, and recover from resource exhaustion, limiting an attacker's ability to sustain impact from uncontrolled consumption.

addresses: CWE-400

Alternate site allows resumption of operations if resource exhaustion at the primary site is exploited to cause unavailability.

addresses: CWE-400

Alternate telecommunications services enable resumption of essential functions when primary services become unavailable due to uncontrolled resource consumption.

addresses: CWE-400

The team can analyze and respond to resource exhaustion incidents, reducing the impact of attacks that exploit uncontrolled consumption weaknesses.

addresses: CWE-400

Timely maintenance support and spare parts enable rapid recovery from failures induced by uncontrolled resource consumption, shortening the impact window of denial-of-service attacks.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Vulnerability is a remotely exploitable DoS in a public-facing e-invoice application via crafted input (CWE-400), directly enabling T1190 (Exploit Public-Facing Application) and T1499.004 (Endpoint DoS via Application Exploitation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An issue in Insiders Technologies GmbH e-invoice pro before release 1 Service Pack 2 allows a remote attacker to cause a denial of service via a crafted script

Deeper analysisAI

CVE-2025-56424 is a denial-of-service vulnerability in Insiders Technologies GmbH e-invoice pro versions prior to release 1 Service Pack 2. The flaw, tied to CWE-400 (Uncontrolled Resource Consumption), enables a remote attacker to disrupt service availability by sending a crafted script. It carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), reflecting its high severity from network-based access with low attack complexity and no authentication or user interaction needed.

A remote, unauthenticated attacker can exploit this vulnerability by transmitting a specially crafted script to the affected e-invoice pro instance. Exploitation leads to a high-impact denial of service, potentially causing the service to become unavailable without affecting confidentiality or integrity.

Advisories recommend upgrading to e-invoice pro release 1 Service Pack 2 or later to mitigate the issue. Further details appear in the vendor page at https://insiders-technologies.com/en/e-invoice/ and the analysis at https://mind-bytes.de/xml-external-entity-xxe-injection-in-e-invoice-pro-cve-2025-56424/.

Details

CWE(s)

Affected Products

insiders-technologies
e-invoice pro
1.0

CVEs Like This One

CVE-2025-24269Shared CWE-400
CVE-2025-65890Shared CWE-400
CVE-2025-27669Shared CWE-400
CVE-2024-54730Shared CWE-400
CVE-2025-9282Shared CWE-400
CVE-2025-70886Shared CWE-400
CVE-2025-20058Shared CWE-400
CVE-2025-21547Shared CWE-400
CVE-2026-39304Shared CWE-400
CVE-2025-59472Shared CWE-400

References