PatchSiren

PatchSiren cyber security CVE debrief

CVE-2023-4676 Yordam CVE debrief

CVE-2023-4676 is a reflected cross-site scripting (XSS) issue in Yordam MedasPro. The public record ties the flaw to input that is not properly neutralized during web page generation, which can allow attacker-controlled content to be reflected back into a user’s browser. NVD lists the affected MedasPro range as versions before 28.

Vendor
Yordam
Product
MedasPro
CVSS
MEDIUM 6.1
CISA KEV
Not listed in stored evidence
Original CVE published
2023-09-14
Original CVE updated
2026-05-21
Advisory published
2023-09-14
Advisory updated
2026-05-21

Who should care

Administrators and owners of Yordam MedasPro deployments, security teams responsible for web applications, and anyone who can review update status, browser-facing input handling, and user-facing forms or parameters in MedasPro.

Technical summary

The CVE description and NVD weakness mapping identify CWE-79 (Cross-site Scripting). The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N) indicates network reachability, no privileges required, and user interaction required. The impact is limited but meaningful because reflected XSS can expose session-related or page-context data and can alter what a user sees or does in the affected browser context. The supplied NVD CPE criteria state the vulnerable product is cpe:2.3:a:yordam:medaspro:*:*:*:*:*:*:*:* with versionEndExcluding set to 28.

Defensive priority

Medium. This is not listed as a Known Exploited Vulnerability in the supplied data, but it does affect a browser-facing input path and requires only user interaction, so remediation should still be timely for any exposed MedasPro instance.

Recommended defensive actions

  • Confirm whether your MedasPro deployment is at a version before 28 and plan an update to a non-vulnerable release.
  • Review pages, parameters, and form inputs that are reflected into HTML output and ensure proper output encoding and server-side validation are in place.
  • Test that security controls such as a restrictive Content Security Policy and HttpOnly/SameSite session settings are enabled where appropriate.
  • If patching is not immediately possible, reduce exposure by limiting access to affected interfaces and monitoring for suspicious request patterns that trigger reflected content.
  • Validate remediation against the vendor and USOM references listed for this CVE before closing the issue.

Evidence notes

This debrief uses only the supplied CVE/NVD record and the referenced USOM advisory URLs. The record identifies the weakness as CWE-79 and the vulnerable CPE as Yordam MedasPro versions before 28. The CVE was published on 2023-09-14T20:15:11.923Z; the later 2026-05-21 timestamp is a record modification date, not the issue date.

Official resources

Publicly disclosed in the CVE record on 2023-09-14T20:15:11.923Z. The NVD record was later modified on 2026-05-21T09:16:24.583Z. No KEV listing was supplied for this CVE.