CVE-2026-4175
Aureus ERP Chatter Message content-text-entry.blade.php cross site scripting
Description
A vulnerability was determined in Aureus ERP up to 1.3.0-BETA2. The affected element is an unknown function of the file plugins/webkul/chatter/resources/views/filament/infolists/components/messages/content-text-entry.blade.php of the component Chatter Message Handler. Executing a manipulation of the argument subject/body can lead to cross site scripting. The attack can be launched remotely. Upgrading to version 1.3.0-BETA1 is sufficient to fix this issue. This patch is called 2135ee7efff4090e70050b63015ab5e268760ec8. It is suggested to upgrade the affected component.
INFO
Published Date :
March 15, 2026, 10:32 a.m.
Last Modified :
March 15, 2026, 10:32 a.m.
Remotely Exploit :
No
Source :
VulDB
Affected Products
The following products are affected by CVE-2026-4175
vulnerability.
Even if cvefeed.io is aware of the exact versions of the
products
that
are
affected, the information is not represented in the table below.
No affected product recoded yet
Solution
- Upgrade Aureus ERP to version 1.3.0-BETA1 or later.
- Update the Chatter Message Handler component.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2026-4175 vulnerability anywhere in the article.