CVE-2023-23835Improper Access Control in Mendix

Severity
7.5HIGHNVD
CNA5.9
EPSS
0.3%
top 49.94%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJul 6

Description

A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (All versions < V9.22.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.10), Mendix Applications using Mendix 9 (V9.18) (All versions < V9.18.4), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.15). Some of the Mendix runtime API’s allow attackers to bypass XPath cons

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

CVEListV5siemens/mendix_applications_using_mendix_7All versions < V7.23.34
CVEListV5siemens/mendix_applications_using_mendix_8All versions < V8.18.23
NVDmendix/mendix7.0.27.23.34+5

🔴Vulnerability Details

2
GHSA
GHSA-j4w7-pf4q-5fwj: A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V72023-07-06
CVEList
CVE-2023-23835: A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V72023-02-14
CVE-2023-23835 — Improper Access Control in Mendix | cvebase