Description
A security vulnerability has been detected in Devs Palace ERP Online up to 4.0.0. This vulnerability affects unknown code of the file /accounts/mr-save. Such manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-05-11
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows an attacker to inject malicious script into the client browser through the /accounts/mr-save component of Devs Palace ERP Online. The injected code can execute in the context of any user viewing the affected page, enabling theft of session cookies, data exfiltration, or defacement. The weakness is a classic Reflected or Stored XSS flaw, as catalogued by CWE‑79; the presence of separate CWE‑94 suggests that the code may also process user input as executable code, further reducing the developer’s ability to safely sanitize the input. The CVSS score of 4.8 indicates that the flaw is considered low‑severity, but once exploited it can expose confidential data to every web user that visits the affected page.

Affected Systems

Devs Palace ERP Online versions up to 4.0.0 are affected. No specific patch version is identified in the advisory, and the vendor has not responded to the disclosure.

Risk and Exploitability

The CVSS score of 4.8 indicates a low‑severity vulnerability; EPSS is not available, and the advisory is not listed in the CISA KEV catalog. The likely attack vector is a remote user submitting a crafted request to the mr‑save endpoint, whereby unsanitized or improperly encoded input allows script injection. The remote nature of the exploit and the lack of defensive controls means that any authenticated or unauthenticated user who receives the rendered page could be impacted. While the low score suggests a moderate risk, the simplicity of an XSS payload and the public disclosure increase the likelihood that organizations will be targeted by scripted attacks.

Generated by OpenCVE AI on May 11, 2026 at 02:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Devs Palace ERP Online to a version newer than 4.0.0 or apply a patch that sanitizes and encodes all input to the /accounts/mr-save endpoint
  • Implement comprehensive input validation to reject or properly escape any HTML or JavaScript characters before storing or rendering user data
  • Enforce stricter access controls on the mr‑save functionality, limiting it to authorized users only and preventing remote invocation from unauthenticated sources

Generated by OpenCVE AI on May 11, 2026 at 02:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 02:45:00 +0000

Type Values Removed Values Added
First Time appeared Devs Palace
Devs Palace erp Online
Vendors & Products Devs Palace
Devs Palace erp Online

Mon, 11 May 2026 01:30:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in Devs Palace ERP Online up to 4.0.0. This vulnerability affects unknown code of the file /accounts/mr-save. Such manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Title Devs Palace ERP Online mr-save cross site scripting
Weaknesses CWE-79
CWE-94
References
Metrics cvssV2_0

{'score': 3.3, 'vector': 'AV:N/AC:L/Au:M/C:N/I:P/A:N/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 2.4, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 2.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Devs Palace Erp Online
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T14:08:51.626Z

Reserved: 2026-05-10T14:46:11.727Z

Link: CVE-2026-8256

cve-icon Vulnrichment

Updated: 2026-05-11T14:08:48.302Z

cve-icon NVD

Status : Deferred

Published: 2026-05-11T02:16:26.867

Modified: 2026-05-11T15:08:09.893

Link: CVE-2026-8256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T02:30:25Z

Weaknesses