Skip to main content

CVE-2023-2743: CWE-79 Cross-Site Scripting (XSS) in Unknown WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting

Medium
VulnerabilityCVE-2023-2743cvecve-2023-2743cwe-79
Published: Tue Jun 27 2023 (06/27/2023, 13:17:05 UTC)
Source: CVE
Vendor/Project: Unknown
Product: WP ERP | Complete HR solution with recruitment & job listings | WooCommerce CRM & Accounting

Description

The ERP WordPress plugin before 1.12.4 does not sanitise and escape the employee_name parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

AI-Powered Analysis

AILast updated: 07/07/2025, 00:40:24 UTC

Technical Analysis

CVE-2023-2743 is a reflected Cross-Site Scripting (XSS) vulnerability identified in the WP ERP WordPress plugin, a comprehensive enterprise resource planning solution that includes HR management, recruitment, job listings, WooCommerce CRM, and accounting functionalities. The vulnerability exists in versions prior to 1.12.4 of the plugin. Specifically, the issue arises because the plugin fails to properly sanitize and escape the 'employee_name' parameter before reflecting it back in the web page output. This improper handling allows an attacker to inject malicious JavaScript code into the parameter, which is then executed in the context of the victim's browser when the crafted URL or input is accessed. Since the vulnerability is reflected, it requires the victim to interact with a malicious link or input. The threat is particularly critical when targeting high-privilege users such as administrators, as successful exploitation could lead to session hijacking, privilege escalation, or unauthorized actions performed with admin rights. The CVSS 3.1 base score is 6.1 (medium severity), with vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, indicating network attack vector, low attack complexity, no privileges required, user interaction needed, scope changed, and partial impact on confidentiality and integrity but no impact on availability. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be weaponized by attackers. The plugin is widely used by organizations relying on WordPress for ERP and HR management, making this vulnerability relevant to many enterprises that use this plugin for critical business functions.

Potential Impact

For European organizations using the WP ERP plugin, this vulnerability poses a risk primarily to the confidentiality and integrity of sensitive HR and business data. Successful exploitation could allow attackers to execute arbitrary scripts in the context of administrative users, potentially leading to theft of credentials, session tokens, or manipulation of employee records and financial data. This could result in unauthorized access to confidential employee information, disruption of HR operations, and potential compliance violations under regulations such as GDPR. The reflected XSS nature means phishing or social engineering could be used to trick users into clicking malicious links, increasing the attack surface. Given the plugin's role in managing recruitment, payroll, and accounting, exploitation could also facilitate fraud or sabotage of financial records. Although availability impact is not indicated, the breach of integrity and confidentiality could have significant operational and reputational consequences for European enterprises, especially those in regulated sectors or with large employee bases.

Mitigation Recommendations

European organizations should immediately verify the version of the WP ERP plugin in use and upgrade to version 1.12.4 or later where the vulnerability is patched. If upgrading is not immediately possible, implement web application firewall (WAF) rules to detect and block suspicious requests containing malicious payloads in the 'employee_name' parameter. Employ Content Security Policy (CSP) headers to restrict the execution of unauthorized scripts in browsers. Additionally, conduct user awareness training to reduce the risk of phishing attacks leveraging this vulnerability. Regularly audit and monitor logs for unusual access patterns or repeated attempts to exploit this parameter. For organizations with custom integrations or legacy systems, perform code reviews to ensure proper input validation and output encoding is enforced. Finally, ensure that all administrative access is protected by multi-factor authentication (MFA) to limit the damage from compromised credentials.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-05-16T19:09:56.865Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d981fc4522896dcbdc5ea

Added to database: 5/21/2025, 9:08:47 AM

Last enriched: 7/7/2025, 12:40:24 AM

Last updated: 8/11/2025, 6:58:30 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats