Vulnerability Description
A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (All versions < V9.22.0), Mendix Applications using Mendix 9 (V9.12) (All versions < V9.12.10), Mendix Applications using Mendix 9 (V9.18) (All versions < V9.18.4), Mendix Applications using Mendix 9 (V9.6) (All versions < V9.6.15). Some of the Mendix runtime API’s allow attackers to bypass XPath constraints and retrieve information using XPath queries that trigger errors.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Mendix | Mendix | >= 7.0.2, < 7.23.34 |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-252808.pdfRelease NotesThird Party Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-252808.pdfRelease NotesThird Party Advisory
FAQ
What is CVE-2023-23835?
CVE-2023-23835 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A vulnerability has been identified in Mendix Applications using Mendix 7 (All versions < V7.23.34), Mendix Applications using Mendix 8 (All versions < V8.18.23), Mendix Applications using Mendix 9 (A...
How severe is CVE-2023-23835?
CVE-2023-23835 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-23835?
Check the references section above for vendor advisories and patch information. Affected products include: Mendix Mendix.