{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T01:08:52.648","vulnerabilities":[{"cve":{"id":"CVE-2023-40043","sourceIdentifier":"security@progress.com","published":"2023-09-20T17:15:11.240","lastModified":"2024-11-21T08:18:35.230","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"\nIn Progress MOVEit Transfer versions released before 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), a SQL injection vulnerability has been identified in the MOVEit Transfer web interface that could allow a MOVEit system administrator account to gain unauthorized access to the MOVEit Transfer database. A MOVEit system administrator\n\n could submit a crafted payload to the MOVEit Transfer web interface which could result in modification and disclosure of MOVEit database content.\n\n"},{"lang":"es","value":"En las versiones de MOVEit Transfer lanzadas antes de 2021.1.8 (13.1.8), 2022.0.8 (14.0.8), 2022.1.9 (14.1.9), 2023.0.6 (15.0.6), se ha identificado una vulnerabilidad de inyección SQL en la interfaz web de MOVEit Transfer que podría permitir que una cuenta de administrador del sistema MOVEit obtenga acceso no autorizado a la base de datos de MOVEit Transfer. Un administrador del sistema MOVEit podría enviar un payload manipulado a la interfaz web de MOVEit Transfer, lo que podría dar como resultado la modificación y divulgación del contenido de la base de datos de MOVEit."}],"metrics":{"cvssMetricV31":[{"source":"security@progress.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@progress.com","type":"Secondary","description":[{"lang":"en","value":"CWE-89"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-89"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionEndExcluding":"2021.1.8","matchCriteriaId":"F6E9F262-3E55-48FF-94A0-09C0C80FE7C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.0.0","versionEndExcluding":"2022.0.8","matchCriteriaId":"B1FFF5B1-D887-48EA-BFD1-FBD9F699DEA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"2022.1.0","versionEndExcluding":"2022.1.9","matchCriteriaId":"64138C94-BAB8-45D2-93A1-31FC4D4F1E41"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"2023.0.0","versionEndExcluding":"2023.0.6","matchCriteriaId":"C35AF1A0-05E8-4F69-9F99-91925C490EE9"}]}]}],"references":[{"url":"https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023","source":"security@progress.com","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/moveit","source":"security@progress.com","tags":["Product"]},{"url":"https://community.progress.com/s/article/MOVEit-Transfer-Service-Pack-September-2023","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://www.progress.com/moveit","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]}]}}]}