CVE-2026-4175: Aureus ERP vulnerable to cross-site scripting in the Chatter Message Handler
(updated )
A vulnerability was determined in Aureus ERP up to 1.3.0-BETA1. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component.
References
- github.com/advisories/GHSA-76c2-3q6g-xvpm
- github.com/aureuserp/aureuserp
- github.com/aureuserp/aureuserp/commit/2135ee7efff4090e70050b63015ab5e268760ec8
- github.com/aureuserp/aureuserp/pull/939
- github.com/aureuserp/aureuserp/releases/tag/v1.3.0-BETA1
- nvd.nist.gov/vuln/detail/CVE-2026-4175
- vuldb.com/?ctiid.351083
- vuldb.com/?id.351083
- vuldb.com/?submit.769827
Code Behaviors & Features
Detect and mitigate CVE-2026-4175 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →