PatchSiren cyber security CVE debrief
CVE-2023-5988 Uyumsoft Information System and Technologies CVE debrief
CVE-2023-5988 is a reflected cross-site scripting (XSS) vulnerability in Uyumsoft Information System and Technologies' LioXERP. According to the supplied sources, versions before v.146 are affected. The issue was published on 2023-12-21 and carries a CVSS 3.1 score of 6.1 (Medium).
- Vendor
- Uyumsoft Information System and Technologies
- Product
- LioXERP
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-12-21
- Original CVE updated
- 2026-05-20
- Advisory published
- 2023-12-21
- Advisory updated
- 2026-05-20
Who should care
Organizations running Uyumsoft LioXERP, especially any deployment exposed to untrusted web input or user-supplied parameters in browser-facing pages. Security teams should also care if LioXERP is used by employees who routinely access application links from emails, portals, or other web workflows, since the vulnerability requires user interaction.
Technical summary
The vulnerability is identified as CWE-79 (Improper Neutralization of Input During Web Page Generation). The NVD vector indicates network attack vector, low attack complexity, no privileges required, and user interaction required, with scope changed and low confidentiality/integrity impact. In practical terms, an attacker may be able to inject malicious script into a page generated by the application and have that script executed in a victim's browser when the victim follows a crafted link or otherwise triggers the vulnerable response. The affected product mapping in the source corpus is cpe:2.3:a:uyumsoft:lioxerp:*:*:*:*:*:*:*:* with the vulnerable range ending before 0.146.
Defensive priority
Medium priority. Patch or upgrade should be scheduled promptly for any exposed or user-facing LioXERP instance, with extra attention to environments where users can be lured into clicking crafted URLs or opening application-generated links.
Recommended defensive actions
- Upgrade Uyumsoft LioXERP to v.146 or later, since versions before v.146 are marked vulnerable in the supplied sources.
- Review any browser-facing endpoints, parameters, and rendered outputs in LioXERP for insufficient output encoding or input neutralization.
- Validate that web application controls such as context-aware output escaping and input handling are functioning as expected after upgrade.
- Warn users to treat unexpected LioXERP links cautiously until remediation is complete, because the vulnerability depends on user interaction.
- Check for signs of abuse in logs and application telemetry around reflected parameters or unusual script-bearing input.
- If immediate upgrade is not possible, reduce exposure by limiting access to the affected application and monitoring any pages that reflect user input.
Evidence notes
The description states that CVE-2023-5988 affects Uyumsoft LioXERP and allows reflected XSS before v.146. NVD metadata in the supplied corpus maps the vulnerable CPE to Uyumsoft LioXERP and lists the version boundary as versionEndExcluding 0.146. The source corpus also records CWE-79 and the CVSS 3.1 vector AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N, supporting a browser-interaction-driven reflected XSS assessment. No exploit details or remediation steps beyond version upgrade are included in the supplied corpus.
Official resources
-
CVE-2023-5988 CVE record
CVE.org
-
CVE-2023-5988 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Published by the CVE record on 2023-12-21. The supplied source metadata was modified on 2026-05-20, but that is a record update date, not the original vulnerability publication date.