Erxes vulnerable to Cross-site Scripting
Description
Erxes, an experience operating system (XOS) with a set of plugins, is vulnerable to cross-site scripting in versions 0.22.3 and prior. This results in client-side code execution. The victim must follow a malicious link or be redirected there from malicious web site. There are no known patches.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Cross-site scripting vulnerability in Erxes versions 0.22.3 and prior allows an attacker to execute client-side code by tricking a victim into following a malicious link.
Vulnerability
Description
Erxes, an open-source experience operating system (XOS) that unifies marketing, sales, and support functions, contains a cross-site scripting (XSS) vulnerability in versions 0.22.3 and earlier. The flaw resides in the widget server component, specifically in how user-controlled input is rendered in the EJS template widget.ejs [4]. The code in widgets/server/index.ts does not properly sanitize or escape data before including it in the server-rendered view, allowing an attacker to inject arbitrary JavaScript into the page [3][1].
Exploitation
Vector
To exploit CVE-2021-32853, the attacker must deliver a crafted URL to a victim, either by embedding it in a phishing email, forum post, or redirecting the victim from a malicious site. The victim must be running a vulnerable instance of Erxes (≤ 0.22.3) and click on the malicious link. No authentication is required on the part of the attacker to craft the payload; the XSS triggers when the victim's browser renders the attacker-controlled input within the widget's server-rendered view [1][4].
Impact
If a victim visits the malicious link, the injected script executes in the context of the Erxes application domain. This enables the attacker to perform a range of client-side actions, such as stealing session cookies, modifying page content, or redirecting the user to further phishing pages. Since Erxes handles sensitive business data (CRM, marketing, support), successful exploitation could lead to data exposure or account takeover [1][2].
Mitigation
Status
The CVE advisory explicitly states that there are no known patches as of the publication date [1]. Users running affected versions should consider upgrading to a newer version if one becomes available, or apply mitigations such as strict Content Security Policy (CSP) headers and input validation on server-rendered templates until an official fix is released. The vulnerability is not currently listed in CISA's Known Exploited Vulnerabilities catalog.
- NVD - CVE-2021-32853
- GitHub - erxes/erxes: Experience Operating System (XOS) that unifies marketing, sales, operations, and support — run your core business seamlessly while replacing HubSpot, Zendesk, Linear, Wix and more.
- erxes/widgets/server/index.ts at f131b49add72032650d483f044d00658908aaf4a · erxes/erxes
- erxes/widgets/server/views/widget.ejs at f131b49add72032650d483f044d00658908aaf4a · erxes/erxes
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
erxesnpm | <= 1.0.1 | — |
Affected products
2- npm/erxesv5Range: 0.22.3
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- github.com/advisories/GHSA-g9ph-r9hc-34r8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-32853ghsaADVISORY
- securitylab.github.com/advisories/GHSL-2021-103-erxesghsaADVISORY
- github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/index.tsghsaWEB
- github.com/erxes/erxes/blob/f131b49add72032650d483f044d00658908aaf4a/widgets/server/views/widget.ejsghsaWEB
- securitylab.github.com/advisories/GHSL-2021-103-erxes/mitre
News mentions
0No linked articles in our index yet.