This page provides supplementary material for a presentation given at the German OWASP Day 2025 (Presentation Slides).
Intro
With the eInvoicing Directive (2014/55/EU), the European Union introduced “standardized” electronic invoices in XML format. Increasingly, institutions and businesses in EU member states will be required to support these electronic invoices.
While machine-readable invoices are, in general, a good idea, there are various issues with the EU’s approach, including needless complexity, a lack of true standardization (multiple syntaxes and various sub-formats), and a tendency to use technologies with inherent security problems.
Due to a combination of unfortunate design decisions, implementing software for electronic invoices is likely to be affected by security flaws if no countermeasures are implemented.
XML Insecurity and XXE
The XML format is known to have inherent security flaws, the most dangerous ones being XXE vulnerabilities (XML eXternal Entity injection).
XXE vulnerabilities often allow the exfiltration of files. While some XML implementations have implemented secure defaults or were never vulnerable to begin with (e.g., Python, libxml2, .NET, Expat), others remain insecure by default.
Two notable examples of implementations with insecure defaults are the Java standard library and the Saxon library. Both are commonly used within the electronic invoicing ecosystem.
The problem with XSLT 2.0
XSLT is a document transformation language. Only XSLT version 1.0 is widely supported. For XSLT 2.0 and above, only one freely available implementation exists: Saxon.
To check compliance with the EN16931 standards, the EU provides validation artifacts based on Schematron. Those validation artifacts require XSLT 2.0.
Thus, anyone using these validation artifacts will likely use Saxon to implement invoice parsing. Saxon, as mentioned, is vulnerable to XXE by default.
Despite its poor implementation status and the fact that its primary implementation has insecure defaults, XSLT 2.0 (and its successor 3.0) is a W3C recommendation. I raised these concerns with the W3C.
Security test suite
A security test suite for electronic invoices is provided here.
Getting the EN16931 standards
The EU requirements for electronic invoices are standardized by the European Committee for Standardization (CEN) in a set of standards named EN16931. The first two parts are available free of charge. Subsequent parts cost money.
Accessing these standards is surprisingly difficult. A link on the EU web page to CEN is currently broken. CEN does not provide direct downloads of these documents and refers to national standardization organizations. Those often require account registrations even to access the free-of-charge parts of the standard.
The Estonian standardization organization (EVS) provides downloads of parts one and two without registration:
For the parts of EN16931 that are not available free of charge, prices at EVS are cheaper than those at most other national standardization organizations.
XXE vulnerabilties
List of security vulnerabilities discovered in electronic invoicing software during this research:
| Product | Vuln type | Info |
|---|---|---|
| kivitendo | XXE | Reported 2025-03-25, Fixed in 3.9.2beta (2025-03-28) / 3.9.2 (2025-05-05), Software Stack: Perl/XML::LibXML |
| peppol-py | Blind XXE | Reported: 2025-11-13, fixed in 1.1.1 (2025-11-13), Software Stack: Python/Saxon |
| ZUV* | Blind XXE | Reported: 2025-11-17, no longer developed according to README, Software Stack: Java/Saxon |
| papierkram.de E-Rechnung-Viewer | XXE | Reported: 2025-03-30, fixed: 2025-03-31 |
| EPO E-Invoice Viewer | XXE | Reported: 2025-10-13, fixed: 2025-10-14 |
| portinvoice | XXE | Reported: 2025-10-29, fixed: 2025-10-29 |
| xrechnung-erstellen.com E-Rechnung Viewer | XXE | Reported: 2025-10-14, fixed: 2025-10-16 |
| Belegmeister ZUGFERD VIEWER | Blind XXE | Reported: 2025-11-15 (only supports PDF upload), fixed: 2025-11-25 |
| E-Rechnungs-Validator by winball.de | Blind XXE | Reported: 2025-11-17, fixed: 2025-11-19, confirmation |
| ZUGFeRD Community ZF/FX Invoiceportal | Blind XXE | Reported: 2025-11-17, no reply, re-tested on 2025-11-25, validation functionality was removed (relied on ZUV) |
| REDACTED1 | XXE | Reported: 2025-10-29, no reply, re-tested on 2025-11-18, fix incomplete (see next line) |
| REDACTED1 | Blind XXE | Reported: 2025-11-18, no reply, unfixed |
| REDACTED2 | Blind XXE | Reported: 2025-11-17, no reply, unfixed |
* ZUV is no longer developed, and it is recommended to use Mustang instead. Mustang was also vulnerable to XXE in versions before 2.16.3.
