CVE-2025-2715
Description
A vulnerability classified as problematic has been found in timschofield webERP up to 5.0.0.rc+13. This affects an unknown part of the file ConfirmDispatch_Invoice.php of the component Confirm Dispatch and Invoice Page. The manipulation of the argument Narrative leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A stored XSS in webERP's ConfirmDispatch_Invoice.php allows an attacker with a low-privilege role to inject scripts via the Narrative field, potentially leading to admin account creation.
Root
Cause
The vulnerability resides in ConfirmDispatch_Invoice.php, a component of webERP's Confirm Dispatch and Invoice page. The Narrative parameter is not properly sanitized before being rendered. This allows a user with the Inquiries/Order Entry security role to inject arbitrary HTML and JavaScript into the field [1]. The unsanitized input is later stored and executed when a privileged user (e.g., a system administrator) views the page [1].
Exploitation
An attacker with the Inquiries/Order Entry role can craft a malicious order containing a JavaScript payload in the Narrative field. For example, the proof of concept uses `` to load an external script [1]. The attacker then sends a specially crafted URL to a system administrator. When the administrator opens the Confirm Dispatch and Invoice page, the injected script executes [1]. The attack does not require authentication beyond the low-privilege role, and the victim (administrator) only needs to view the page.
Impact
Successful exploitation allows the injected script to perform actions in the context of the administrator's session. The published reference demonstrates that the script can send a POST request to create a new user with System Administrator privileges, effectively leading to privilege escalation [1]. The CVSS v4.0 base score is 7.4 (High) for confidentiality and integrity impacts, though the original CVSS v3.1 score is 3.5 (Low) [1]. The discrepancy likely reflects that the attack requires a victim to interact with the malicious content.
Mitigation
The vendor has been contacted but did not respond. A patch is recommended [1]. Users should apply the latest fixes from the webERP repository or implement input sanitization for the Narrative field on ConfirmDispatch_Invoice.php [1]. As of the publication date, the vulnerability affects webERP up to version 5.0.0.rc+13, and no official advisory has been released.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.