Description
A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component.
Published: 2026-03-15
Score: 5.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑site scripting
Action: Patch Now
AI Analysis

Impact

A vulnerability exists in Aureus ERP’s Chatter Message Handler component, specifically in the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php. The flaw arises from insufficient sanitization of the subject and body arguments, allowing an attacker to inject arbitrary client‑side script when a user views a malicious message. This stored XSS (CWE‑79) could also permit code injection (CWE‑94) depending on the execution context.

Affected Systems

The vulnerable product is Aureus:ERP. Versions up to 1.3.0‑BETA2 include the issue, while the patch commit 2135ee7efff4090e70050b63015ab5e268760ec8 is incorporated in version 1.3.0‑BETA1, indicating that releases 1.3.0‑BETA1 and later are expected to contain the fix.

Risk and Exploitability

The CVSS score of 5.1 indicates moderate severity, and the EPSS score of less than 1 % suggests a low likelihood of active exploitation. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Exploitation requires remote access to the application and the ability to submit crafted message content via the Chatter interface; once a victim views the stored message, the attacker’s injected script will execute in the victim’s browser.

Generated by OpenCVE AI on April 15, 2026 at 08:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Aureus ERP to version 1.3.0‑BETA1 or later, which includes the patch commit 2135ee7efff4090e70050b63015ab5e268760ec8.
  • If an upgrade is not immediately possible, disable the Chatter message posting feature or restrict it to trusted users until a patch is applied.
  • Configure the web application to enforce strict content‑security policies and server‑side output escaping to mitigate potential XSS even if the underlying flaw persists.

Generated by OpenCVE AI on April 15, 2026 at 08:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-76c2-3q6g-xvpm Aureus ERP vulnerable to cross-site scripting in the Chatter Message Handler
History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Aureus
Aureus erp
Vendors & Products Aureus
Aureus erp

Sun, 15 Mar 2026 11:00:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component.
Title Aureus ERP Chatter Message content-text-entry.blade.php cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 4, 'vector': 'AV:N/AC:L/Au:S/C:N/I:P/A:N/E:ND/RL:OF/RC:C'}

cvssV3_0

{'score': 3.5, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C'}

cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:X/RL:O/RC:C'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-17T15:16:24.573Z

Reserved: 2026-03-14T15:15:06.380Z

Link: CVE-2026-4175

cve-icon Vulnrichment

Updated: 2026-03-17T15:16:20.529Z

cve-icon NVD

Status : Deferred

Published: 2026-03-16T14:19:58.163

Modified: 2026-04-22T21:32:08.360

Link: CVE-2026-4175

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:45:09Z

Weaknesses