⚠ Actively exploited
Added to CISA KEV on 2023-07-20. Federal agencies required to patch by 2023-08-10. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..

CVE-2023-38205Improper Access Control in Adobe Coldfusion

Severity
7.5HIGHNVD
EPSS
94.2%
top 0.08%
CISA KEV
KEV
Added 2023-07-20
Due 2023-08-10
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
KEV addedJul 20
KEV dueAug 10
PublishedSep 14
Latest updateNov 6
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerability that could result in a Security feature bypass. An attacker could leverage this vulnerability to access the administration CFM and CFC endpoints. Exploitation of this issue does not require user interaction.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

CVEListV5adobe/coldfusioncf2023U2
NVDadobe/coldfusion2018, 2021, 2023+2

🔴Vulnerability Details

3
CVEList
ColdFusion Bypass - Vulnerability disclosure in ColdFusion | BYPASS CVE-2023-292982023-09-14
GHSA
GHSA-76wh-rggp-rxxq: Adobe ColdFusion versions 2018u18 (and earlier), 2021u8 (and earlier) and 2023u2 (and earlier) are affected by an Improper Access Control vulnerabilit2023-09-14
VulnCheck
Adobe ColdFusion Improper Access Control Vulnerability2023

💥Exploits & PoCs

1
Nuclei
Adobe ColdFusion - Access Control Bypass

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS Adobe ColdFusion Access Control Bypass (CVE-2023-38205)2025-11-06

📋Vendor Advisories

1
CISA
Adobe ColdFusion Improper Access Control Vulnerability2023-07-20

💬Community

1
HackerOne
Adobe ColdFusion Access Control Bypass - CVE-2023-382052023-12-21
CVE-2023-38205 — Improper Access Control in Adobe | cvebase