Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-76c2-3q6g-xvpm | Aureus ERP vulnerable to cross-site scripting in the Chatter Message Handler |
Tue, 17 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Aureus
Aureus erp |
|
| Vendors & Products |
Aureus
Aureus erp |
Sun, 15 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component. | |
| Title | Aureus ERP Chatter Message content-text-entry.blade.php cross site scripting | |
| Weaknesses | CWE-79 CWE-94 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-03-17T15:16:24.573Z
Reserved: 2026-03-14T15:15:06.380Z
Link: CVE-2026-4175
Updated: 2026-03-17T15:16:20.529Z
Status : Deferred
Published: 2026-03-16T14:19:58.163
Modified: 2026-04-22T21:32:08.360
Link: CVE-2026-4175
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:45:09Z
Github GHSA