{"api_version":"1","generated_at":"2026-04-22T16:07:21+00:00","cve":"CVE-2023-36934","urls":{"html":"https://cve.report/CVE-2023-36934","api":"https://cve.report/api/cve/CVE-2023-36934.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-36934","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-36934"},"summary":{"title":"CVE-2023-36934","description":"In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content.","state":"PUBLIC","assigner":"cve@mitre.org","published_at":"2023-07-05 16:15:00","updated_at":"2023-07-10 13:49:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023","name":"https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023","refsource":"CONFIRM","tags":[],"title":"Progress Customer Community","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.progress.com/moveit","name":"https://www.progress.com/moveit","refsource":"MISC","tags":[],"title":"MOVEit Secure Managed File Transfer Software | Progress","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-36934","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-36934","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"36934","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"progress","cpe5":"moveit_transfer","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2023-36934","qid":"378633","title":"Progress MOVEit Transfer Multiple SQL Injection Vulnerabilities"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2023-36934","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In Progress MOVEit Transfer before 2020.1.11 (12.1.11), 2021.0.9 (13.0.9), 2021.1.7 (13.1.7), 2022.0.7 (14.0.7), 2022.1.8 (14.1.8), and 2023.0.4 (15.0.4), a SQL injection vulnerability has been identified in the MOVEit Transfer web application that could allow an unauthenticated attacker to gain unauthorized access to the MOVEit Transfer database. An attacker could submit a crafted payload to a MOVEit Transfer application endpoint that could result in modification and disclosure of MOVEit database content."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"url":"https://www.progress.com/moveit","refsource":"MISC","name":"https://www.progress.com/moveit"},{"refsource":"CONFIRM","name":"https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023","url":"https://community.progress.com/s/article/MOVEit-Transfer-2020-1-Service-Pack-July-2023"}]}},"nvd":{"publishedDate":"2023-07-05 16:15:00","lastModifiedDate":"2023-07-10 13:49:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":9.1,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.2}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"15.0.0","versionEndExcluding":"15.0.4","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"14.1.0","versionEndExcluding":"14.1.8","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"14.0.0","versionEndExcluding":"14.0.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"13.1.0","versionEndExcluding":"13.1.7","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionStartIncluding":"13.0.0","versionEndExcluding":"13.0.9","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:progress:moveit_transfer:*:*:*:*:*:*:*:*","versionEndExcluding":"12.1.11","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}