PatchSiren cyber security CVE debrief
CVE-2023-4676 Yordam CVE debrief
CVE-2023-4676 is a reflected cross-site scripting (XSS) issue in Yordam MedasPro. The public record ties the flaw to input that is not properly neutralized during web page generation, which can allow attacker-controlled content to be reflected back into a user’s browser. NVD lists the affected MedasPro range as versions before 28.
- Vendor
- Yordam
- Product
- MedasPro
- CVSS
- MEDIUM 6.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2023-09-14
- Original CVE updated
- 2026-05-21
- Advisory published
- 2023-09-14
- Advisory updated
- 2026-05-21
Who should care
Administrators and owners of Yordam MedasPro deployments, security teams responsible for web applications, and anyone who can review update status, browser-facing input handling, and user-facing forms or parameters in MedasPro.
Technical summary
The CVE description and NVD weakness mapping identify CWE-79 (Cross-site Scripting). The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network reachability, no privileges required, and user interaction required. The impact is limited but meaningful because reflected XSS can expose session-related or page-context data and can alter what a user sees or does in the affected browser context. The supplied NVD CPE criteria state the vulnerable product is cpe:2.3:a:yordam:medaspro:*:*:*:*:*:*:*:* with versionEndExcluding set to 28.
Defensive priority
Medium. This is not listed as a Known Exploited Vulnerability in the supplied data, but it does affect a browser-facing input path and requires only user interaction, so remediation should still be timely for any exposed MedasPro instance.
Recommended defensive actions
- Confirm whether your MedasPro deployment is at a version before 28 and plan an update to a non-vulnerable release.
- Review pages, parameters, and form inputs that are reflected into HTML output and ensure proper output encoding and server-side validation are in place.
- Test that security controls such as a restrictive Content Security Policy and HttpOnly/SameSite session settings are enabled where appropriate.
- If patching is not immediately possible, reduce exposure by limiting access to affected interfaces and monitoring for suspicious request patterns that trigger reflected content.
- Validate remediation against the vendor and USOM references listed for this CVE before closing the issue.
Evidence notes
This debrief uses only the supplied CVE/NVD record and the referenced USOM advisory URLs. The record identifies the weakness as CWE-79 and the vulnerable CPE as Yordam MedasPro versions before 28. The CVE was published on 2023-09-14T20:15:11.923Z; the later 2026-05-21 timestamp is a record modification date, not the issue date.
Official resources
-
CVE-2023-4676 CVE record
CVE.org
-
CVE-2023-4676 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
Publicly disclosed in the CVE record on 2023-09-14T20:15:11.923Z. The NVD record was later modified on 2026-05-21T09:16:24.583Z. No KEV listing was supplied for this CVE.