### [CVE-2021-36800](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-36800) ![](https://img.shields.io/static/v1?label=Product&message=Akaunting&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=2.1.12%3C%3D%202.1.12%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) ### Description Akaunting version 2.1.12 and earlier suffers from a code injection issue in the Money.php component of the application. A POST sent to /{company_id}/sales/invoices/{invoice_id} with an items[0][price] that includes a PHP callable function is executed directly. This issue was fixed in version 2.1.13 of the product. ### POC #### Reference - https://www.rapid7.com/blog/post/2021/07/27/multiple-open-source-web-app-vulnerabilities-fixed/ #### Github No PoCs found on GitHub currently.