{"api_version":"1","generated_at":"2026-04-23T14:03:09+00:00","cve":"CVE-2023-2533","urls":{"html":"https://cve.report/CVE-2023-2533","api":"https://cve.report/api/cve/CVE-2023-2533.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-2533","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-2533"},"summary":{"title":"PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability","description":"A Cross-Site Request Forgery (CSRF) vulnerability has been identified in\nPaperCut NG/MF, which, under specific conditions, could potentially enable\nan attacker to alter security settings or execute arbitrary code. This could\nbe exploited if the target is an admin with a current login session. Exploiting\nthis would typically involve the possibility of deceiving an admin into clicking\na specially crafted malicious link, potentially leading to unauthorized changes.","state":"PUBLIC","assigner":"help@fluidattacks.com","published_at":"2023-06-20 15:15:00","updated_at":"2023-07-06 06:15:00"},"problem_types":["CWE-352"],"metrics":[],"references":[{"url":"https://fluidattacks.com/advisories/arcangel/","name":"https://fluidattacks.com/advisories/arcangel/","refsource":"MISC","tags":[],"title":"PaperCut MF/NG 22.0.10 (Build 65996 2023-03-27) - Remote code execution via CSRF | Advisories | Fluid Attacks","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.papercut.com/","name":"https://www.papercut.com/","refsource":"MISC","tags":[],"title":"PaperCut: Print management software","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.papercut.com/kb/Main/SecurityBulletinJune2023","name":"https://www.papercut.com/kb/Main/SecurityBulletinJune2023","refsource":"MISC","tags":[],"title":"PaperCut NG/MF Security Bulletin (June 2023) | PaperCut","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-2533","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-2533","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"2533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"papercut","cpe5":"papercut_mf","cpe6":"22.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"2533","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"papercut","cpe5":"papercut_ng","cpe6":"22.0.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2023","cve_id":"2533","cve":"CVE-2023-2533","vendorProject":"PaperCut","product":"NG/MF","vulnerabilityName":"PaperCut NG/MF Cross-Site Request Forgery (CSRF) Vulnerability","dateAdded":"2025-07-28","shortDescription":"PaperCut NG/MF contains a cross-site request forgery (CSRF) vulnerability, which, under specific conditions, could potentially enable an attacker to alter security settings or execute arbitrary code. ","requiredAction":"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.","dueDate":"2025-08-18","knownRansomwareCampaignUse":"Unknown","notes":"https://www.papercut.com/kb/Main/SecurityBulletinJune2023 ; https://nvd.nist.gov/vuln/detail/CVE-2023-2533","cwes":"CWE-352","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2023","cve_id":"2533","cve":"CVE-2023-2533","epss":"0.363220000","percentile":"0.971310000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-2533","ASSIGNER":"help@fluidattacks.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A Cross-Site Request Forgery (CSRF) vulnerability has been identified in\nPaperCut NG/MF, which, under specific conditions, could potentially enable\nan attacker to alter security settings or execute arbitrary code. This could\nbe exploited if the target is an admin with a current login session. Exploiting\nthis would typically involve the possibility of deceiving an admin into clicking\na specially crafted malicious link, potentially leading to unauthorized changes.\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-352 Cross-Site Request Forgery (CSRF)","cweId":"CWE-352"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"PaperCut","product":{"product_data":[{"product_name":"PaperCut NG/MF","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"lessThan":"2.1.1","status":"affected","version":"22.0.10","versionType":"custom"},{"status":"unaffected","version":"21.2.12"},{"status":"unaffected","version":"20.1.8"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://fluidattacks.com/advisories/arcangel/","refsource":"MISC","name":"https://fluidattacks.com/advisories/arcangel/"},{"url":"https://www.papercut.com/kb/Main/SecurityBulletinJune2023","refsource":"MISC","name":"https://www.papercut.com/kb/Main/SecurityBulletinJune2023"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"EXTERNAL"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.4,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-06-20 15:15:00","lastModifiedDate":"2023-07-06 06:15:00","problem_types":["CWE-352"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:papercut:papercut_mf:22.0.10:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:papercut:papercut_ng:22.0.10:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}