{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-23753","assignerOrgId":"6ff30186-7fb7-4ad9-be33-533e7b05e586","state":"PUBLISHED","assignerShortName":"Joomla","dateReserved":"2023-01-17T19:02:50.302Z","datePublished":"2023-04-23T20:33:51.958Z","dateUpdated":"2025-02-06T10:48:25.140Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Visforms Base Package for Joomla 3","vendor":"vi-solutions","versions":[{"status":"affected","version":"3.0.4"},{"status":"unaffected","version":"3.0.5"}]}],"credits":[{"lang":"en","type":"finder","value":"David Álvarez, Francisco Díaz-Pache and Sergio Corral from Grupo CIES - AliSEC and Kevin Barbón"}],"datePublic":"2023-04-24T18:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>The 'Visforms Base Package for Joomla 3' extension is vulnerable to SQL Injection as concatenation is used to construct an SQL Query. An attacker can interact with the database and could be able to read, modify and delete data on it.</p>"}],"value":"The 'Visforms Base Package for Joomla 3' extension is vulnerable to SQL Injection as concatenation is used to construct an SQL Query. An attacker can interact with the database and could be able to read, modify and delete data on it."}],"impacts":[{"descriptions":[{"lang":"en","value":"An attacker can interact with the database and could be able to read, modify and delete data on it."}]}],"problemTypes":[{"descriptions":[{"description":"SQL Injection","lang":"en"}]}],"providerMetadata":{"orgId":"6ff30186-7fb7-4ad9-be33-533e7b05e586","shortName":"Joomla","dateUpdated":"2025-02-06T10:48:25.140Z"},"references":[{"tags":["vendor-advisory"],"url":"https://vi-solutions.de/en/announcements/867-security-announcement-cve-2023-23754"},{"tags":["third-party-advisory"],"url":"https://blog.asturhackers.es/sql-injection-en-visforms-base-package-for-joomla-3-0-5-cve-2023-23753"}],"source":{"discovery":"UNKNOWN"},"title":"Extension - vi-solutions - Visforms Base Package for Joomla 3","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:42:25.788Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://vi-solutions.de/en/announcements/867-security-announcement-cve-2023-23754"},{"tags":["third-party-advisory","x_transferred"],"url":"https://blog.asturhackers.es/sql-injection-en-visforms-base-package-for-joomla-3-0-5-cve-2023-23753"}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}],"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":9.8,"attackVector":"NETWORK","baseSeverity":"CRITICAL","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","integrityImpact":"HIGH","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"HIGH","privilegesRequired":"NONE","confidentialityImpact":"HIGH"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-02-05T15:44:46.766910Z","id":"CVE-2023-23753","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-02-05T15:45:10.056Z"}}]}}