Cyber Posture

CVE-2023-37777

Critical

Published: 22 January 2025

Published
22 January 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0011 28.7th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2023-37777 is a critical-severity SQL Injection (CWE-89) vulnerability in Infosecwriteups (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 28.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mandates validation of the API endpoint parameter to block SQL injection via crafted input lacking proper sanitization.

prevent

Requires identification, reporting, and correction of the specific SQL injection flaw in Synnefo IMS version 2023 and earlier.

prevent

Enforces least privilege on the database account used by the application, limiting damage from SQL injection granting DB administrator access.

NVD Description

A SQL injection vulnerability exists in Synnefo Internet Management Software (IMS) version 2023 and earlier. This vulnerability occurs due to improper input validation in a specific API endpoint parameter allowing an attacker to manipulate SQL queries via crafted input. Successful…

more

exploitation could lead to unauthorized access to database records with DB administrator privileges which can be leveraged to escalate privileges further and execute arbitrary OS commands.

Deeper analysisAI

CVE-2023-37777 is a SQL injection vulnerability affecting Synnefo Internet Management Software (IMS) version 2023 and earlier. The flaw arises from improper input validation in a specific API endpoint parameter, enabling attackers to inject and manipulate SQL queries through crafted input. Assigned a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and mapped to CWE-89, it was published on 2025-01-22.

Remote attackers require only network access with no authentication, privileges, or user interaction to exploit this vulnerability over the network with low complexity. Successful exploitation grants unauthorized access to database records using DB administrator privileges, allowing attackers to escalate privileges further and execute arbitrary operating system commands.

Mitigation details are available in the referenced advisories, including the vendor site at https://synnefoims.com/ and the discovery write-up at https://infosecwriteups.com/how-i-discovered-a-critical-vulnerability-in-an-internet-service-providers-software-56c6cc00f338.

Details

CWE(s)

Affected Products

Infosecwriteups
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-2094Shared CWE-89
CVE-2026-3180Shared CWE-89
CVE-2025-1872Shared CWE-89
CVE-2026-23492Shared CWE-89
CVE-2024-12016Shared CWE-89
CVE-2025-26200Shared CWE-89
CVE-2019-25541Shared CWE-89
CVE-2024-57629Shared CWE-89
CVE-2019-25699Shared CWE-89
CVE-2025-49050Shared CWE-89

References