VYPR
Moderate severityNVD Advisory· Published Sep 28, 2023· Updated Sep 23, 2024

CVE-2023-43884

CVE-2023-43884

Description

A Cross-site scripting (XSS) vulnerability in Reference ID from the panel Transactions, of Subrion v4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into 'Reference ID' parameter.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A stored cross-site scripting vulnerability in Subrion CMS 4.2.1 allows attackers to execute arbitrary HTML/JavaScript via the 'Reference ID' parameter in the Transactions panel.

A stored cross-site scripting (XSS) vulnerability exists in Subrion CMS version 4.2.1. The flaw is present in the 'Reference ID' parameter within the Transactions panel of the application's administrative interface. An attacker can inject a crafted payload (e.g., HTML or JavaScript) into this field, which is then stored by the system without proper sanitization [1][3].

To exploit the vulnerability, an attacker must have access to the Transactions panel, typically requiring authenticated access to the Subrion CMS admin backend. Once a transaction is created with a malicious Reference ID, the payload is stored and subsequently rendered when any user (including other administrators) visits the /profile/funds/ page. The attack does not require user interaction beyond navigating to that page, and the injected script executes in the context of the victim's session [3].

Successful exploitation enables an attacker to execute arbitrary web scripts or HTML in the browser of any user viewing the affected page. This can lead to session hijacking, theft of sensitive data, or defacement of the CMS dashboard. The impact is limited to authenticated users who have access to the funds/profile area, but could allow privilege escalation or account takeover if an admin’s session is compromised [1][3].

As of the latest information, no patch has been released for this specific vulnerability in Subrion 4.2.1. The vendor's development branch on GitHub shows continued activity but no fix for this issue [2]. Users are advised to restrict access to the Transactions panel to trusted administrators, apply input validation manually, or upgrade to a patched version if made available.

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
intelliants/subrionPackagist
<= 4.2.1

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.