Impact
A cross‑site scripting flaw exists in an unknown function of the /inventory/supplier-save endpoint in Devs Palace ERP Online. The flaw allows attackers to inject arbitrary HTML or JavaScript that is executed in the browser of any user who views the page. The vulnerability is characterized as CWE‑79 and also involves a code evaluation weakness (CWE‑94). It is not an arbitrary code execution vulnerability, but it permits the execution of user‑supplied scripts in the client context.
Affected Systems
All installations of Devs Palace ERP Online with a version of 4.0.0 or earlier are affected. The specific function that processes supplier data in the /inventory/supplier-save path is impacted.
Risk and Exploitability
The CVSS base score of 4.8 classifies the problem as moderate severity. The EPSS score is not available, so the likelihood of exploitation cannot be quantified, but the vulnerability has already been publicly disclosed. It is not listed in CISA’s KEV catalog. Remote exploitation is possible, and an attacker would need to send crafted input to the supplier-save endpoint, which is reachable via the web interface of the ERP system.
OpenCVE Enrichment