PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-5988 Uyumsoft Information System and Technologies CVE debrief

CVE-2023-5988 is a reflected cross-site scripting (XSS) vulnerability in Uyumsoft Information System and Technologies' LioXERP. According to the supplied sources, versions before v.146 are affected. The issue was published on 2023-12-21 and carries a CVSS 3.1 score of 6.1 (Medium).

Vendor
Uyumsoft Information System and Technologies
Product
LioXERP
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2023-12-21
Original CVE updated
2026-05-20
Advisory published
2023-12-21
Advisory updated
2026-05-20

Who should care

Organizations running Uyumsoft LioXERP, especially any deployment exposed to untrusted web input or user-supplied parameters in browser-facing pages. Security teams should also care if LioXERP is used by employees who routinely access application links from emails, portals, or other web workflows, since the vulnerability requires user interaction.

Technical summary

The vulnerability is identified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The NVD vector indicates network attack vector, low attack complexity, no privileges required, and user interaction required, with scope changed and low confidentiality/integrity impact. In practical terms, an attacker may be able to inject malicious script into a page generated by the application and have that script executed in a victim's browser when the victim follows a crafted link or otherwise triggers the vulnerable response. The affected product mapping in the source corpus is cpe:2.3:a:uyumsoft:lioxerp:*:*:*:*:*:*:*:* with the vulnerable range ending before 0.146.

Defensive priority

Medium priority. Patch or upgrade should be scheduled promptly for any exposed or user-facing LioXERP instance, with extra attention to environments where users can be lured into clicking crafted URLs or opening application-generated links.

Recommended defensive actions

  • Upgrade Uyumsoft LioXERP to v.146 or later, since versions before v.146 are marked vulnerable in the supplied sources.
  • Review any browser-facing endpoints, parameters, and rendered outputs in LioXERP for insufficient output encoding or input neutralization.
  • Validate that web application controls such as context-aware output escaping and input handling are functioning as expected after upgrade.
  • Warn users to treat unexpected LioXERP links cautiously until remediation is complete, because the vulnerability depends on user interaction.
  • Check for signs of abuse in logs and application telemetry around reflected parameters or unusual script-bearing input.
  • If immediate upgrade is not possible, reduce exposure by limiting access to the affected application and monitoring any pages that reflect user input.

Evidence notes

The description states that CVE-2023-5988 affects Uyumsoft LioXERP and allows reflected XSS before v.146. NVD metadata in the supplied corpus maps the vulnerable CPE to Uyumsoft LioXERP and lists the version boundary as versionEndExcluding 0.146. The source corpus also records CWE-79 and the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, supporting a browser-interaction-driven reflected XSS assessment. No exploit details or remediation steps beyond version upgrade are included in the supplied corpus.

Official resources

Published by the CVE record on 2023-12-21. The supplied source metadata was modified on 2026-05-20, but that is a record update date, not the original vulnerability publication date.