{"api_version":"1","generated_at":"2026-05-13T07:40:29+00:00","cve":"CVE-2023-35811","urls":{"html":"https://cve.report/CVE-2023-35811","api":"https://cve.report/api/cve/CVE-2023-35811.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-35811","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-35811"},"summary":{"title":"CVE-2023-35811","description":"An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-06-17 22:15:00","updated_at":"2023-08-23 16:15:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html","name":"http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html","refsource":"MISC","tags":[],"title":"SugarCRM 12.2.0 SQL Injection ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/","name":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/","refsource":"MISC","tags":[],"title":"sugarcrm-sa-2023-008 - SugarCRM Support Site","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://seclists.org/fulldisclosure/2023/Aug/29","name":"20230823 [KIS-2023-08] SugarCRM <= 12.2.0 Two SQL Injection Vulnerabilities","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: [KIS-2023-08] SugarCRM <= 12.2.0 Two SQL Injection\tVulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-35811","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-35811","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"35811","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sugarcrm","cpe5":"sugarcrm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"35811","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sugarcrm","cpe5":"sugarcrm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"35811","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sugarcrm","cpe5":"sugarcrm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"sell","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"35811","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sugarcrm","cpe5":"sugarcrm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"serve","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"35811","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"sugarcrm","cpe5":"sugarcrm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"ultimate","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-35811","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An issue was discovered in SugarCRM Enterprise before 11.0.6 and 12.x before 12.0.3. Two SQL Injection vectors have been identified in the REST API. By using crafted requests, custom SQL code can be injected through the REST API because of missing input validation. Regular user privileges can use used for exploitation. Editions other than Enterprise are also affected."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/","refsource":"MISC","name":"https://support.sugarcrm.com/Resources/Security/sugarcrm-sa-2023-008/"},{"refsource":"FULLDISC","name":"20230823 [KIS-2023-08] SugarCRM <= 12.2.0 Two SQL Injection Vulnerabilities","url":"http://seclists.org/fulldisclosure/2023/Aug/29"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html","url":"http://packetstormsecurity.com/files/174303/SugarCRM-12.2.0-SQL-Injection.html"}]}},"nvd":{"publishedDate":"2023-06-17 22:15:00","lastModifiedDate":"2023-08-23 16:15:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:enterprise:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:serve:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:sell:*:*:*","versionStartIncluding":"12.0.0","versionEndExcluding":"12.0.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:serve:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:sell:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:ultimate:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:sugarcrm:sugarcrm:*:*:*:*:professional:*:*:*","versionStartIncluding":"11.0.0","versionEndExcluding":"11.0.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}