Vulnerability Description
Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.
CVSS Score
6.5
MEDIUM
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pimcore | Core | < 10.3.0 |
Related Weaknesses (CWE)
References
- https://github.com/pimcore/demo/commit/a2a7ff3b565882aefb759804aac4a51afb458f1fPatch
- https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7ExploitThird Party Advisory
- https://github.com/pimcore/demo/commit/a2a7ff3b565882aefb759804aac4a51afb458f1fPatch
- https://huntr.dev/bounties/65c954f2-79c3-4672-8846-a3035e7a1db7ExploitThird Party Advisory
FAQ
What is CVE-2023-5192?
CVE-2023-5192 is a vulnerability with a CVSS score of 6.5 (MEDIUM). Excessive Data Query Operations in a Large Data Table in GitHub repository pimcore/demo prior to 10.3.0.
How severe is CVE-2023-5192?
CVE-2023-5192 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-5192?
Check the references section above for vendor advisories and patch information. Affected products include: Pimcore Core.