CVE-2026-8253: Cross Site Scripting in Devs Palace ERP Online
CVE-2026-8253 is a cross-site scripting (XSS) vulnerability in Devs Palace ERP Online version 4. 0. 0, specifically in an unknown functionality of the /inventory/purchase_save file. The vulnerability allows remote attackers to inject malicious scripts. The vendor has not responded to disclosure attempts, and no official fix or patch is currently available. The CVSS score is 4. 8, indicating a medium severity level.
AI Analysis
Technical Summary
This vulnerability in Devs Palace ERP Online up to version 4.0.0 involves a cross-site scripting issue in an unspecified functionality within the /inventory/purchase_save endpoint. The vulnerability can be triggered remotely without user interaction, but requires high privileges and user interaction according to the CVSS vector. The vendor has not provided any response or patch, and no official remediation guidance is available.
Potential Impact
Successful exploitation could allow an attacker to execute arbitrary scripts in the context of the affected application, potentially leading to session hijacking, defacement, or other client-side attacks. The CVSS vector indicates that the attack requires high privileges and user interaction, which limits the ease of exploitation. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vendor has not responded and no patch is available, users should consider applying web application firewall (WAF) rules to detect and block XSS attempts targeting the /inventory/purchase_save endpoint and limit access to this functionality to trusted users only.
CVE-2026-8253: Cross Site Scripting in Devs Palace ERP Online
Description
CVE-2026-8253 is a cross-site scripting (XSS) vulnerability in Devs Palace ERP Online version 4. 0. 0, specifically in an unknown functionality of the /inventory/purchase_save file. The vulnerability allows remote attackers to inject malicious scripts. The vendor has not responded to disclosure attempts, and no official fix or patch is currently available. The CVSS score is 4. 8, indicating a medium severity level.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability in Devs Palace ERP Online up to version 4.0.0 involves a cross-site scripting issue in an unspecified functionality within the /inventory/purchase_save endpoint. The vulnerability can be triggered remotely without user interaction, but requires high privileges and user interaction according to the CVSS vector. The vendor has not provided any response or patch, and no official remediation guidance is available.
Potential Impact
Successful exploitation could allow an attacker to execute arbitrary scripts in the context of the affected application, potentially leading to session hijacking, defacement, or other client-side attacks. The CVSS vector indicates that the attack requires high privileges and user interaction, which limits the ease of exploitation. There are no known exploits in the wild at this time.
Mitigation Recommendations
Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since the vendor has not responded and no patch is available, users should consider applying web application firewall (WAF) rules to detect and block XSS attempts targeting the /inventory/purchase_save endpoint and limit access to this functionality to trusted users only.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-05-10T14:41:48.254Z
- Cvss Version
- 4.0
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 6a011678cbff5d861007db3e
Added to database: 5/10/2026, 11:36:24 PM
Last enriched: 5/10/2026, 11:51:19 PM
Last updated: 5/11/2026, 12:44:48 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.